First published: Wed Feb 14 2024(Updated: )
Dell SupportAssist for Business PCs version 3.4.0 contains a local Authentication Bypass vulnerability that allows locally authenticated non-admin users to gain temporary privilege within the SupportAssist User Interface on their respective PC. The Run as Admin temporary privilege feature enables IT/System Administrators to perform driver scans and Dell-recommended driver installations without requiring them to log out of the local non-admin user session. However, the granted privilege is limited solely to the SupportAssist User Interface and automatically expires after 15 minutes.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dell SupportAssist for Home PCs | =3.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-39249 has been classified as a medium severity vulnerability.
To fix CVE-2023-39249, update Dell SupportAssist for Business PCs to the latest version.
CVE-2023-39249 affects local non-admin users of Dell SupportAssist for Business PCs version 3.4.0.
CVE-2023-39249 is a local Authentication Bypass vulnerability.
Attackers can exploit CVE-2023-39249 to gain temporary privileges within the SupportAssist User Interface.