Dell SupportAssist for Business PCs version 3.4.0 contains a local Authentication Bypass vulnerability that allows locally authenticated non-admin users to gain temporary privilege within the SupportAssist User Interface on their respective PC. The Run as Admin temporary privilege feature enables IT/System Administrators to perform driver scans and Dell-recommended driver installations without requiring them to log out of the local non-admin user session. However, the granted privilege is limited solely to the SupportAssist User Interface and automatically expires after 15 minutes.
Metrics
Affected Vendors & Products
References
History
Thu, 17 Oct 2024 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Dell
Dell supportassist For Home Pcs |
|
Weaknesses | NVD-CWE-Other | |
CPEs | cpe:2.3:a:dell:supportassist_for_home_pcs:3.4.0:*:*:*:*:*:*:* | |
Vendors & Products |
Dell
Dell supportassist For Home Pcs |
MITRE
Status: PUBLISHED
Assigner: dell
Published: 2024-02-14T07:36:06.873Z
Updated: 2024-08-14T18:11:57.163Z
Reserved: 2023-07-26T08:13:50.421Z
Link: CVE-2023-39249
Vulnrichment
Updated: 2024-08-02T18:02:06.855Z
NVD
Status : Analyzed
Published: 2024-02-14T08:15:09.013
Modified: 2024-10-17T14:27:08.333
Link: CVE-2023-39249
Redhat
No data.