First published: Wed Feb 01 2023(Updated: )
Dell Command | Update, Dell Update, and Alienware Update versions prior to 4.7 contain a improper verification of cryptographic signature in get applicable driver component. A local malicious user could potentially exploit this vulnerability leading to malicious payload execution.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dell Alienware Update | <4.7.1 | |
Dell Command Update | <4.7.1 | |
Dell Update | <4.7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Dell Update vulnerability is CVE-2022-34459.
The severity of CVE-2022-34459 is high with a severity value of 7.8.
The affected software versions are Dell Command | Update versions prior to 4.7, Dell Update versions prior to 4.7, and Dell Alienware Update versions prior to 4.7.1.
CVE-2022-34459 is a vulnerability in Dell Command | Update, Dell Update, and Alienware Update versions prior to 4.7 that allows a local malicious user to execute a malicious payload by exploiting an improper verification of cryptographic signature in the get applicable driver component.
To fix CVE-2022-34459, it is recommended to update to Dell Command | Update version 4.7 or later, Dell Update version 4.7 or later, and Dell Alienware Update version 4.7.1 or later.