Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:dell:supportassist_for_home_pcs:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "E7DE7F09-E1B0-483D-8241-F651CF8E8572", "vulnerable": true}, {"criteria": "cpe:2.3:a:dell:supportassist_for_home_pcs:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "3C8F4A0F-E438-4F2E-8A33-187CE75FAB4F", "vulnerable": true}, {"criteria": "cpe:2.3:a:dell:supportassist_for_home_pcs:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "BB974920-8A37-4F63-80E6-09EFDBAFDDFF", "vulnerable": true}, {"criteria": "cpe:2.3:a:dell:supportassist_for_home_pcs:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "1FCFCE04-A041-46C0-BF79-E3A22FAC60BB", "vulnerable": true}, {"criteria": "cpe:2.3:a:dell:supportassist_for_home_pcs:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "73C0307A-C79B-4262-BA8F-72DE0D16E955", "vulnerable": true}, {"criteria": "cpe:2.3:a:dell:supportassist_for_home_pcs:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "E033D129-9E35-4308-8B79-FD2DC3B11E26", "vulnerable": true}, {"criteria": "cpe:2.3:a:dell:supportassist_for_home_pcs:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "C1D14116-B6F1-4CB7-9DA3-A09D6C058EBD", "vulnerable": true}, {"criteria": "cpe:2.3:a:dell:supportassist_for_home_pcs:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "94BAE3A8-C6AB-49E6-BB38-DDEE98F89AC0", "vulnerable": true}, {"criteria": "cpe:2.3:a:dell:supportassist_for_home_pcs:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "E29BF94B-0F1B-4E5C-8DAF-5BBBCCBCF801", "vulnerable": true}, {"criteria": "cpe:2.3:a:dell:supportassist_for_home_pcs:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "4E6E726D-5249-4FA9-9F51-37BF0DB0E4CF", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:dell:supportassist_for_business_pcs:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4BC3859C-3FC5-44F5-A3DB-0745DAD22EB4", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "Dell SupportAssist for Business PCs version 2.0 and Dell SupportAssist for Home PCs version 2.2, 2.2.1, 2.2.2, 2.2.3, 3.0, 3.0.1, 3.0.2, 3.1, 3.2, and 3.2.1 contain an Improper Privilege Management Vulnerability. A malicious local user can exploit this vulnerability by inheriting a system thread using a leaked thread handle to gain system privileges on the affected machine."}, {"lang": "es", "value": "Dell SupportAssist para PCs de Empresas versi\u00f3n 2.0 y Dell SupportAssist para PCs de Hogar versiones 2.2, 2.2.1, 2.2.2, 2.2.3, 3.0, 3.0.1, 3.0.2, 3.1, 3.2 y 3.2.1, contienen una Vulnerabilidad de Administraci\u00f3n de Privilegios Inapropiada . Un usuario local malicioso puede explotar esta vulnerabilidad al heredar un hilo (subproceso) del sistema utilizando un identificador de hilo (subproceso) filtrado para alcanzar privilegios del sistema en la m\u00e1quina afectada."}], "id": "CVE-2019-3735", "lastModified": "2024-11-21T04:42:25.920", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0"}, "exploitabilityScore": 1.0, "impactScore": 5.9, "source": "security_alert@emc.com", "type": "Secondary"}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2019-06-20T22:15:11.117", "references": [{"source": "security_alert@emc.com", "tags": ["Vendor Advisory"], "url": "http://www.dell.com/support/article/sln317453"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://www.dell.com/support/article/sln317453"}], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-269"}], "source": "nvd@nist.gov", "type": "Primary"}]}