Dell Command | Update, Dell Update, and Alienware Update versions prior to 4.7 contain a improper verification of cryptographic signature in get applicable driver component. A local malicious user could potentially exploit this vulnerability leading to malicious payload execution.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-37414 | Dell Command | Update, Dell Update, and Alienware Update versions prior to 4.7 contain a improper verification of cryptographic signature in get applicable driver component. A local malicious user could potentially exploit this vulnerability leading to malicious payload execution. |
Thu, 27 Mar 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: dell
Published:
Updated: 2025-03-27T14:08:56.088Z
Reserved: 2022-06-23T18:55:17.136Z
Link: CVE-2022-34459
Updated: 2024-08-03T09:15:15.084Z
Status : Modified
Published: 2023-02-01T05:15:12.513
Modified: 2024-11-21T07:09:36.817
Link: CVE-2022-34459
No data.
OpenCVE Enrichment
No data.
EUVD