Impact
The vulnerability is a Client‑Side Enforcement of Server‑Side Security flaw that allows a high‑privileged attacker with remote access to bypass client‑side security controls, potentially compromising the integrity of the management environment. It is classified as CWE‑602, indicating inadequate enforcement of server‑side security policies by the client, which could enable unintended privilege escalation or unauthorized configuration changes. This weakness alone does not grant confidentiality loss but undermines the integrity and enforcement of protection mechanisms.
Affected Systems
Dell Wyse Management Suite installations running any version prior to 5.5 are affected. The flaw resides in components that enforce security policies on the client based on server instructions, and applies to all such client instances within the suite.
Risk and Exploitability
The CVSS score of 2.7 reflects a low overall risk, and the EPSS score of less than 1 % indicates a very low likelihood of exploitation in the wild. The vulnerability is not listed in the KEV catalog. Nonetheless, if an attacker already has high‑privilege remote access to a client, they can exploit the flaw to bypass server‑defined protection mechanisms. The overall risk depends primarily on the attacker’s pre‑existing access level, with no exploitation possible for unauthenticated users.
OpenCVE Enrichment