Page 4 of 27 results (0.006 seconds)

CVSS: 7.1EPSS: 0%CPEs: 2EXPL: 0

Dell SupportAssist Client Consumer versions (3.10.4 and versions prior) and Dell SupportAssist Client Commercial versions (3.1.1 and versions prior) contain an arbitrary file deletion vulnerability. Authenticated non-admin user could exploit the issue and delete arbitrary files on the system. Dell SupportAssist Client Consumer versiones (3.10.4 y versiones anteriores) y Dell SupportAssist Client Commercial (3.1.1 y versiones anteriores) contienen una vulnerabilidad de eliminación de archivos arbitrarios. Un usuario autenticado que no sea administrador podría aprovechar el problema y eliminar archivos arbitrarios en el sistema • https://www.dell.com/support/kbdoc/en-us/000200456/dsa-2022-139-dell-supportassist-for-home-pcs-and-business-pcs-security-update-for-multiple-security-vulnerabilities • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

Dell SupportAssist Client Consumer versions (3.11.0 and versions prior) and Dell SupportAssist Client Commercial versions (3.2.0 and versions prior) contain a privilege escalation vulnerability. A non-admin user can exploit the vulnerability and gain admin access to the system. Dell SupportAssist Client Consumer versiones (3.11.0 y versiones anteriores) y Dell SupportAssist Client Commercial (3.2.0 y versiones anteriores) contienen una vulnerabilidad de escalada de privilegios. Un usuario no administrador puede aprovechar la vulnerabilidad y conseguir acceso de administrador al sistema • https://www.dell.com/support/kbdoc/en-us/000200456/dsa-2022-139-dell-supportassist-for-home-pcs-and-business-pcs-security-update-for-multiple-security-vulnerabilities • CWE-427: Uncontrolled Search Path Element •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

Dell Support Assist OS Recovery versions before 5.5.2 contain an Authentication Bypass vulnerability. An unauthenticated attacker with physical access to the system may exploit this vulnerability by bypassing OS Recovery authentication in order to run arbitrary code on the system as Administrator. Dell Support Assist OS Recovery versiones anteriores a 5.5.2, contienen una vulnerabilidad de omisión de autenticación. Un atacante no autenticado con acceso físico al sistema puede explotar esta vulnerabilidad al omitir la autenticación de OS Recovery para ejecutar código arbitrario en el sistema como administrador • https://www.dell.com/support/kbdoc/en-us/000198780/dsa-2022-102 • CWE-287: Improper Authentication CWE-288: Authentication Bypass Using an Alternate Path or Channel •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

SupportAssist Client version 3.8 and 3.9 contains an Untrusted search path vulnerability that allows attackers to load an arbitrary .dll file via .dll planting/hijacking, only by a separate administrative action that is not a default part of the SOSInstallerTool.exe installation for executing arbitrary dll's, SupportAssist Client versiones 3.8 y 3.9, contienen una vulnerabilidad de ruta de búsqueda no Confiable que permite a atacantes cargar un archivo .dll arbitrario por medio de una plantación/secuestro de .dll, sólo por una acción administrativa independiente que no es una parte predeterminada de la instalación de SOSInstallerTool.exe para ejecutar dll's arbitrarios • https://www.dell.com/support/kbdoc/en-us/000191057/dsa-2021-163-dell-supportassist-client-consumer-security-update-for-two-vulnerabilities • CWE-426: Untrusted Search Path •

CVSS: 7.1EPSS: 0%CPEs: 1EXPL: 0

Dell SupportAssist Client Consumer versions 3.9.13.0 and any versions prior to 3.9.13.0 contain an arbitrary file deletion vulnerability that can be exploited by using the Windows feature of NTFS called Symbolic links. Symbolic links can be created by any(non-privileged) user under some object directories, but by themselves are not sufficient to successfully escalate privileges. However, combining them with a different object, such as the NTFS junction point allows for the exploitation. Support assist clean files functionality do not distinguish junction points from the physical folder and proceeds to clean the target of the junction that allows nonprivileged users to create junction points and delete arbitrary files on the system which can be accessed only by the admin. Dell SupportAssist Client Consumer versiones 3.9.13.0 y todas las versiones anteriores a 3.9.13.0, contienen una vulnerabilidad de eliminación de archivos arbitrarios que puede ser explotada al usar la función de Windows de NTFS denominada enlaces Simbólicos. • https://www.dell.com/support/kbdoc/en-us/000191057/dsa-2021-163-dell-supportassist-client-consumer-security-update-for-two-vulnerabilities • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-59: Improper Link Resolution Before File Access ('Link Following') •