CVE-2019-3735
Published Jun 20, 2019
Last updated 2 years ago
Overview
- Description
- Dell SupportAssist for Business PCs version 2.0 and Dell SupportAssist for Home PCs version 2.2, 2.2.1, 2.2.2, 2.2.3, 3.0, 3.0.1, 3.0.2, 3.1, 3.2, and 3.2.1 contain an Improper Privilege Management Vulnerability. A malicious local user can exploit this vulnerability by inheriting a system thread using a leaked thread handle to gain system privileges on the affected machine.
- Source
- security_alert@emc.com
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 3.0
- Type
- Secondary
- Base score
- 7
- Impact score
- 5.9
- Exploitability score
- 1
- Vector string
- CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 7.2
- Impact score
- 10
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-269
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:supportassist_for_home_pcs:2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E7DE7F09-E1B0-483D-8241-F651CF8E8572" }, { "criteria": "cpe:2.3:a:dell:supportassist_for_home_pcs:2.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3C8F4A0F-E438-4F2E-8A33-187CE75FAB4F" }, { "criteria": "cpe:2.3:a:dell:supportassist_for_home_pcs:2.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BB974920-8A37-4F63-80E6-09EFDBAFDDFF" }, { "criteria": "cpe:2.3:a:dell:supportassist_for_home_pcs:2.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1FCFCE04-A041-46C0-BF79-E3A22FAC60BB" }, { "criteria": "cpe:2.3:a:dell:supportassist_for_home_pcs:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "73C0307A-C79B-4262-BA8F-72DE0D16E955" }, { "criteria": "cpe:2.3:a:dell:supportassist_for_home_pcs:3.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E033D129-9E35-4308-8B79-FD2DC3B11E26" }, { "criteria": "cpe:2.3:a:dell:supportassist_for_home_pcs:3.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C1D14116-B6F1-4CB7-9DA3-A09D6C058EBD" }, { "criteria": "cpe:2.3:a:dell:supportassist_for_home_pcs:3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "94BAE3A8-C6AB-49E6-BB38-DDEE98F89AC0" }, { "criteria": "cpe:2.3:a:dell:supportassist_for_home_pcs:3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E29BF94B-0F1B-4E5C-8DAF-5BBBCCBCF801" }, { "criteria": "cpe:2.3:a:dell:supportassist_for_home_pcs:3.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4E6E726D-5249-4FA9-9F51-37BF0DB0E4CF" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:dell:supportassist_for_business_pcs:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4BC3859C-3FC5-44F5-A3DB-0745DAD22EB4" } ], "operator": "OR" } ] } ]