Description
Dell Command | Intel vPro Out of Band, versions prior to 4.7.0, contain an Uncontrolled Search Path Element vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.
Published: 2026-03-03
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Immediate Patch
AI Analysis

Impact

Dell Command | Intel vPro Out of Band versions earlier than 4.7.0 suffer from an uncontrolled search path element vulnerability (CWE‑427). The flaw allows a local attacker with limited privileges to influence the search path used by the software, potentially enabling the execution of malicious code under higher authority. Exploitation would result in local privilege escalation, granting the attacker greater access to system resources.

Affected Systems

The issue affects Dell Command | Intel vPro Out of Band on Dell systems, specifically all releases earlier than version 4.7.0. The vulnerability is tied to the component that processes the PATH variable during operation, and the affected binaries are distributed with the Dell Command product suite.

Risk and Exploitability

The CVSS score of 8.8 indicates a high severity, while the EPSS of less than 1 % suggests low current exploitation likelihood. The vulnerability is not listed in the CISA KEV catalog, meaning no publicly known exploitable variants have been reported. An attacker must have physical or local administrative access, so the attack vector is local. If the software remains unpatched, a local user could bypass restrictions, gaining elevated privileges and potentially accessing or modifying sensitive data.

Generated by OpenCVE AI on April 16, 2026 at 13:58 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install the latest Dell Command | Intel vPro Out of Band update (4.7.0 or newer) to remove the uncontrolled search path element flaw.
  • Verify that the PATH environment variable used by the product contains only trusted, system‑owned directories and does not include locations writable by ordinary users.
  • Apply the principle of least privilege to local accounts, limiting their permissions so that even if they exploit the flaw, the damage is contained.

Generated by OpenCVE AI on April 16, 2026 at 13:58 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Title Local Privilege Escalation via Uncontrolled Search Path Element in Dell Command | Intel vPro Out of Band

Thu, 05 Mar 2026 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Dell command \| Intel Vpro Out Of Band
CPEs cpe:2.3:a:dell:command_\|_intel_vpro_out_of_band:*:*:*:*:*:*:*:*
Vendors & Products Dell command \| Intel Vpro Out Of Band

Wed, 04 Mar 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Dell
Dell command | Intel Vpro Out Of Band
Vendors & Products Dell
Dell command | Intel Vpro Out Of Band

Tue, 03 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 03 Mar 2026 21:00:00 +0000

Type Values Removed Values Added
Description Dell Command | Intel vPro Out of Band, versions prior to 4.7.0, contain an Uncontrolled Search Path Element vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.
Weaknesses CWE-427
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}


Subscriptions

Dell Command \| Intel Vpro Out Of Band Command | Intel Vpro Out Of Band
cve-icon MITRE

Status: PUBLISHED

Assigner: dell

Published:

Updated: 2026-03-04T04:55:39.757Z

Reserved: 2026-01-23T06:07:21.817Z

Link: CVE-2026-24502

cve-icon Vulnrichment

Updated: 2026-03-03T21:01:51.580Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-03T21:15:58.240

Modified: 2026-03-05T21:25:08.723

Link: CVE-2026-24502

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T14:00:19Z

Weaknesses