Skip to main content
Some article numbers may have changed. If this isn't what you're looking for, try searching all articles. Search articles

DSA-2023-338: Security Update for a Dell Update Package (DUP) Framework Vulnerability

Summary: Dell Update Package (DUP) Framework remediation is available for an Uncontrolled Search Path vulnerability that could be exploited by malicious users to compromise the affected system.

This article applies to This article does not apply to This article is not tied to any specific product. Not all product versions are identified in this article.

Impact

Medium

Additional Details

A (DUP) is a self-contained executable in a standard package format that updates a single software/firmware element on the system. A DUP consists of two parts: 1. A framework providing a consistent interface for applying payloads. 2. The payload is the firmware/Driver/Software. An Uncontrolled Search Path Vulnerability is applicable to Dell Update Package (DUP) Framework file versions prior to 4.9.10 used in Dell Client Platforms.

Details

Proprietary Code CVEs Description CVSS Base Score CVSS Vector String
CVE-2023-39254 Dell Update Package (DUP), Versions prior to 4.9.10 contain an Uncontrolled Search Path vulnerability. A malicious user with local access to the system could potentially exploit this vulnerability to run arbitrary code as admin. 6.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:HThis hyperlink is taking you to a website outside of Dell Technologies.
Proprietary Code CVEs Description CVSS Base Score CVSS Vector String
CVE-2023-39254 Dell Update Package (DUP), Versions prior to 4.9.10 contain an Uncontrolled Search Path vulnerability. A malicious user with local access to the system could potentially exploit this vulnerability to run arbitrary code as admin. 6.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:HThis hyperlink is taking you to a website outside of Dell Technologies.
Dell Technologies recommends all customers consider both the CVSS base score and any relevant temporal and environmental scores that may impact the potential severity associated with a particular security vulnerability.

Affected Products & Remediation

Product Affected Version(s) Updated Version(s) Link to Update
Dell Update Package (DUP) Framework Versions prior to 4.9.10 4.9.10

https://www.dell.com/support  

Product Affected Version(s) Updated Version(s) Link to Update
Dell Update Package (DUP) Framework Versions prior to 4.9.10 4.9.10

https://www.dell.com/support  

CAUTION: Dell recommends executing Dell Update Package (DUP) software packages from a protected location, one that requires administrative privileges to access, as a best practice.
 
CAUTION: Dell recommends customers follow security best practices for malware protection. Customers should use security software to help protect against malware (advanced threat prevention software or anti-virus).

Workarounds & Mitigations

NOTE: Customers should use the latest Dell Update Package (DUP) available from Dell support when updating their systems. Customers do not need to download and rerun DUPs if the system is already running the latest BIOS, firmware, or driver content.
 
NOTE: To check the DUP Framework file version, right-click on the DUP file, select Properties, and click on the Details tab to find the File version number.

Revision History

RevisionDateDescription
1.02024-02-13Initial Release
2.02024-02-21Updated for enhanced presentation with no changes to content
3.02024-02-21Updated for enhanced presentation with no changes to content
4.02024-02-29Updated for enhanced presentation with no changes to content

Acknowledgements

Dell Technologies would like to thank Dohyun Lee for reporting this issue.

Related Information

Affected Products

Dell Update Packages - Current Version
Article Properties
Article Number: 000217701
Article Type: Dell Security Advisory
Last Modified: 29 Feb 2024
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.