Description

Dell SupportAssist for Business PCs version 3.4.0 contains a local Authentication Bypass vulnerability that allows locally authenticated non-admin users to gain temporary privilege within the SupportAssist User Interface on their respective PC. The Run as Admin temporary privilege feature enables IT/System Administrators to perform driver scans and Dell-recommended driver installations without requiring them to log out of the local non-admin user session. However, the granted privilege is limited solely to the SupportAssist User Interface and automatically expires after 15 minutes.

Published: 2024-02-14
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-42983 Dell SupportAssist for Business PCs version 3.4.0 contains a local Authentication Bypass vulnerability that allows locally authenticated non-admin users to gain temporary privilege within the SupportAssist User Interface on their respective PC. The Run as Admin temporary privilege feature enables IT/System Administrators to perform driver scans and Dell-recommended driver installations without requiring them to log out of the local non-admin user session. However, the granted privilege is limited solely to the SupportAssist User Interface and automatically expires after 15 minutes.
History

Thu, 17 Oct 2024 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Dell
Dell supportassist For Home Pcs
Weaknesses NVD-CWE-Other
CPEs cpe:2.3:a:dell:supportassist_for_home_pcs:3.4.0:*:*:*:*:*:*:*
Vendors & Products Dell
Dell supportassist For Home Pcs

Subscriptions

Dell Supportassist For Home Pcs
cve-icon MITRE

Status: PUBLISHED

Assigner: dell

Published:

Updated: 2024-08-14T18:11:57.163Z

Reserved: 2023-07-26T08:13:50.421Z

Link: CVE-2023-39249

cve-icon Vulnrichment

Updated: 2024-08-02T18:02:06.855Z

cve-icon NVD

Status : Modified

Published: 2024-02-14T08:15:09.013

Modified: 2024-11-21T08:14:59.413

Link: CVE-2023-39249

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses