Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2023-39249
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Dell SupportAssist for Business PCs version 3.4.0 contains a local Authentication Bypass vulnerability that allows locally authenticated non-admin users to gain temporary privilege within the SupportAssist User Interface on their respective PC. The Run as Admin temporary privilege feature enables IT/System Administrators to perform driver scans and Dell-recommended driver installations without requiring them to log out of the local non-admin user session. However, the granted privilege is limited solely to the SupportAssist User Interface and automatically expires after 15 minutes.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
不充分权限或特权的处理不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Dell SupportAssist for Business PCs 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Dell SupportAssist for Business PCs是美国戴尔(Dell)公司的一款适用于企业电脑的客户端应用程序。该程序提供自动化、主动和预测性技术进行故障排除等。 Dell SupportAssist for Business PCs 3.4.0 版本存在安全漏洞,该漏洞源于存在本地身份验证绕过漏洞。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
DellSupportAssist Client Consumer 3.4.0 -
II. Public POCs for CVE-2023-39249
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2023-39249
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2023-39249

No comments yet


Leave a comment