Lucene search

K
vulnrichmentDellVULNRICHMENT:CVE-2023-32479
HistoryFeb 06, 2024 - 8:09 a.m.

CVE-2023-32479

2024-02-0608:09:30
CWE-284
dell
github.com
1
dell
encryption
endpoint security
privilege escalation
vulnerability
acl
management server
reverse shell
exploit

CVSS3

6.7

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Dell Encryption, Dell Endpoint Security Suite Enterprise, and Dell Security Management Server versions prior to 11.9.0 contain privilege escalation vulnerability due to improper ACL of the non-default installation directory. A local malicious user could potentially exploit this vulnerability by replacing binaries in installed directory and taking reverse shell of the system leading to Privilege Escalation.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:dell:security_management_server:11.9.0:*:*:*:*:*:*:*"
    ],
    "vendor": "dell",
    "product": "security_management_server",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "11.9.0",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:dell:endpoint_security_suite_enterprise:11.9.0:*:*:*:*:*:*:*"
    ],
    "vendor": "dell",
    "product": "endpoint_security_suite_enterprise",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "11.9.0",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:a:dell:encryption:11.9.0:*:*:*:*:*:*:*"
    ],
    "vendor": "dell",
    "product": "encryption",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "11.9.0",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

6.7

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Related for VULNRICHMENT:CVE-2023-32479