Lucene search

K
cve[email protected]CVE-2023-28065
HistoryJun 23, 2023 - 12:15 p.m.

CVE-2023-28065

2023-06-2312:15:09
CWE-59
CWE-1386
web.nvd.nist.gov
16
cve-2023-28065
dell
update
alienware
windows
junction
mount point
vulnerability
privilege escalation

7.3 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

7.1 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Dell Command | Update, Dell Update, and Alienware Update versions 4.8.0 and prior contain an Insecure Operation on Windows Junction / Mount Point vulnerability. A local malicious user could potentially exploit this vulnerability leading to privilege escalation.

Affected configurations

NVD
Node
microsoftwindowsMatch-
AND
dellalienware_updateRange<4.9.0
OR
dellcommand_updateRange<4.9.0
OR
dellupdateRange<4.9.0

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "modules": [
      "Dell Update /\r\nAlienware Update",
      "Dell Command | Update"
    ],
    "product": "Dell Command Update (DCU)",
    "vendor": "Dell",
    "versions": [
      {
        "status": "affected",
        "version": "4.8.0 and prior"
      }
    ]
  }
]

7.3 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

7.1 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for CVE-2023-28065