Description
An issue was discovered in the Portrait Dell Color Management application before 3.7.0 for Dell monitors. On Windows, a symbolic link vulnerability allows a local low-privileged user to escalate privileges to Administrator. During installation, the software writes the file CCFLFamily_07Feb11.edr to C:\ProgramData\Portrait Displays\CW\data\i1D3\ while running with elevated privileges. Because the installer does not properly validate symbolic links or reparse points at the destination path, an attacker can create a malicious link that redirects the write operation to an arbitrary system location, enabling arbitrary file creation or overwrite with elevated privileges.
Published: 2026-05-19
Score: 5.3 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

An installation flaw in the Portrait Dell Color Management application allows a local low‑privileged user to create or overwrite files with elevated (Administrator) rights. During setup the installer writes a data file to a privileged location while running as SYSTEM. Because the installer does not validate symbolic links or reparse points, a malicious link can redirect that write operation to an arbitrary system path, giving the user the ability to create or overwrite files that normally require administrative credentials. This flaw permits a local privilege escalation with potentially full control over the affected Windows machine.

Affected Systems

The vulnerability exists in Portrait Dell Color Management versions prior to 3.7.0 on Windows systems that support Dell displays. During installation the path "C:\\ProgramData\\Portrait Displays\\CW\\data\\i1D3\\" is written with elevated privileges. Systems running the affected software and using Dell monitors are therefore at risk.

Risk and Exploitability

The issue is local; an attacker needs only a low‑privileged user account to deploy a malicious symbolic link during installation. The CVSS score of 5.3 indicates a medium severity for this privilege escalation, but the ability to overwrite critical files is still serious. While the EPSS score is not available, the flaw is not listed in the CISA KEV catalog. Without remediation an attacker could write or replace system files, potentially installing malware, modifying security settings, or further elevating their access to full administrative control.

Generated by OpenCVE AI on May 19, 2026 at 17:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Portrait Dell Color Management update (version 3.7.0 or later) which fixes the symbolic‑link validation issue.
  • If an upgrade is not immediately possible, uninstall the software or delete its installation directory and reinstall only after a patch is available.
  • Use Windows file‑system permissions or policy controls (e.g., AppLocker, Software Restriction Policies) to restrict the installer’s ability to create files in privileged locations and to disallow the creation of symbolic links by non‑administrator accounts.

Generated by OpenCVE AI on May 19, 2026 at 17:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 19 May 2026 17:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-774
CWE-862

Tue, 19 May 2026 17:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-774
CWE-862

Tue, 19 May 2026 16:00:00 +0000

Type Values Removed Values Added
Title Local Privilege Escalation via Symbolic Link Vulnerability in Portrait Dell Color Management
Weaknesses CWE-774
CWE-862

Tue, 19 May 2026 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Portrait
Portrait dell Color Management
Vendors & Products Portrait
Portrait dell Color Management

Tue, 19 May 2026 15:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-59
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 19 May 2026 14:30:00 +0000

Type Values Removed Values Added
Description An issue was discovered in the Portrait Dell Color Management application before 3.7.0 for Dell monitors. On Windows, a symbolic link vulnerability allows a local low-privileged user to escalate privileges to Administrator. During installation, the software writes the file CCFLFamily_07Feb11.edr to C:\ProgramData\Portrait Displays\CW\data\i1D3\ while running with elevated privileges. Because the installer does not properly validate symbolic links or reparse points at the destination path, an attacker can create a malicious link that redirects the write operation to an arbitrary system location, enabling arbitrary file creation or overwrite with elevated privileges.
References

Subscriptions

Portrait Dell Color Management
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-05-19T14:39:40.795Z

Reserved: 2026-03-31T00:00:00.000Z

Link: CVE-2026-34883

cve-icon Vulnrichment

Updated: 2026-05-19T14:39:36.918Z

cve-icon NVD

Status : Received

Published: 2026-05-19T15:16:30.150

Modified: 2026-05-19T16:16:20.737

Link: CVE-2026-34883

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-19T17:45:10Z

Weaknesses