High
Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
CVE-2024-52535 | Dell SupportAssist for Home PCs versions 4.6.1 and prior and Dell SupportAssist for Business PCs versions 4.5.0 and prior, contain a symbolic link (symlink) attack vulnerability in the software remediation component. A low-privileged authenticated user could potentially exploit this vulnerability, gaining privileges escalation, leading to arbitrary deletion of files and folders from the system. | 7.1 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
CVE-2024-52535 | Dell SupportAssist for Home PCs versions 4.6.1 and prior and Dell SupportAssist for Business PCs versions 4.5.0 and prior, contain a symbolic link (symlink) attack vulnerability in the software remediation component. A low-privileged authenticated user could potentially exploit this vulnerability, gaining privileges escalation, leading to arbitrary deletion of files and folders from the system. | 7.1 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
Product | Affected Versions | Remediated Versions | Link |
SupportAssist for Home PCs | Versions prior to 4.6.2 | Versions 4.6.2 or later | https://www.dell.com/support/contents/article/product-support/self-support-knowledgebase/software-and-downloads/support-assist/supportassist-for-home |
SupportAssist for Business PCs | Versions prior to 4.5.1 | Versions 4.5.1 or later | https://www.dell.com/lp/dt/supportassist-business-PC |
Product | Affected Versions | Remediated Versions | Link |
SupportAssist for Home PCs | Versions prior to 4.6.2 | Versions 4.6.2 or later | https://www.dell.com/support/contents/article/product-support/self-support-knowledgebase/software-and-downloads/support-assist/supportassist-for-home |
SupportAssist for Business PCs | Versions prior to 4.5.1 | Versions 4.5.1 or later | https://www.dell.com/lp/dt/supportassist-business-PC |
Revision | Date | Description |
1.0 | 2024-12-23 | Initial Release |
Dell would like to thank mdanilor for reporting this issue.