DSA-2025-151: Security Update for Dell Trusted Device for Multiple Vulnerabilities

Zhrnutie: Dell Trusted Device remediation is available for multiple vulnerabilities that could be exploited by malicious users to compromise the affected system.

Tento článok sa vzťahuje na Tento článok sa nevzťahuje na Tento článok nie je viazaný na žiadny konkrétny produkt. V tomto článku nie sú uvedené všetky verzie produktov.

Dosah

Medium

Podrobnosti

Proprietary Code CVEs

Description

CVSS Base Score

CVSS Vector String

CVE-2025-29983

Dell Trusted Device, versions prior to 7.0.3.0, contain an Improper Link Resolution Before File Access ('Link Following') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.

6.7

CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:HThis hyperlink is taking you to a website outside of Dell Technologies.

CVE-2025-29984

Dell Trusted Device, versions prior to 7.0.3.0, contain an Incorrect Default Permissions  vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.

6.7

CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:HThis hyperlink is taking you to a website outside of Dell Technologies.

 

Proprietary Code CVEs

Description

CVSS Base Score

CVSS Vector String

CVE-2025-29983

Dell Trusted Device, versions prior to 7.0.3.0, contain an Improper Link Resolution Before File Access ('Link Following') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.

6.7

CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:HThis hyperlink is taking you to a website outside of Dell Technologies.

CVE-2025-29984

Dell Trusted Device, versions prior to 7.0.3.0, contain an Incorrect Default Permissions  vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.

6.7

CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:HThis hyperlink is taking you to a website outside of Dell Technologies.

 

Dell Technologies odporúča všetkým svojim zákazníkom, aby sa riadili nielen základným skóre CVSS, ale aj prechodným skóre a skóre závažnosti v konkrétnych prostrediach, na základe ktorého môžu vyhodnotiť celkové riziko vo vlastnom prostredí.

Dotknuté produkty a riešenie problému

Product

Affected Versions

Remediated Versions

Release Date

Link

Dell Trusted Device

Versions prior to 7.0.3.0

Version 7.0.3.0 or later

04/02/2025

Dell Trusted Device

 

Product

Affected Versions

Remediated Versions

Release Date

Link

Dell Trusted Device

Versions prior to 7.0.3.0

Version 7.0.3.0 or later

04/02/2025

Dell Trusted Device

 

Alternatívne riešenia a zmiernenia

CVE ID

Workaround and Mitigation

CVE-2025-29983

Save data only to a known safe path or the default path.

CVE-2025-29984

Install only to the default installation path.

 

História revízií

Revision

Date

Description

1.0

2025-04-14

Initial Release

 

Potvrdenia

CVE-2025-29983, CVE-2025-29984: Dell Technologies would like to thank falconCorrup for reporting these issues.

Súvisiace informácie

Dotknuté produkty

Dell Trusted Device
Vlastnosti článku
Číslo článku: 000299528
Typ článku: Dell Security Advisory
Dátum poslednej úpravy: 14 apr 2025
Nájdite odpovede na svoje otázky od ostatných používateľov spoločnosti Dell
Služby podpory
Skontrolujte, či sa na vaše zariadenie vzťahujú služby podpory.