Lucene search

K
cve[email protected]CVE-2022-34389
HistoryFeb 11, 2023 - 1:23 a.m.

CVE-2022-34389

2023-02-1101:23:24
CWE-307
web.nvd.nist.gov
15
cve-2022-34389
dell supportassist
rate limit bypass
screenmeet api
impersonation
vulnerability

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

5.3 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

23.0%

Dell SupportAssist contains a rate limit bypass issues in screenmeet API third party component. An unauthenticated attacker could potentially exploit this vulnerability and impersonate a legitimate dell customer to a dell support technician.

Affected configurations

NVD
Node
dellsupportassist_for_business_pcsRange<3.3.0
OR
dellsupportassist_for_home_pcsRange<3.12.3

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "SupportAssist ",
    "vendor": "Dell",
    "versions": [
      {
        "lessThanOrEqual": "3.11.1, 3.2",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      }
    ]
  }
]

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

5.3 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

23.0%

Related for CVE-2022-34389