6.7

CVE-2024-52537

Dell Client Platform Firmware Update Utility contains an Improper Link Resolution vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.

Data is provided by the National Vulnerability Database (NVD)
DellDock Hd22q Firmware Update Utility Version < 1.00.23
   LinuxLinux Kernel Version-
   MicrosoftWindows Version- HwPlatformarm64
   MicrosoftWindows Version- HwPlatformx86
DellDock Hd22q Firmware Update Utility Version < 1.00.28
   LinuxLinux Kernel Version-
   MicrosoftWindows Version- HwPlatformarm64
   MicrosoftWindows Version- HwPlatformx86
DellDock Wd19 Firmware Update Utility Version < 01.00.44
   LinuxLinux Kernel Version-
   MicrosoftWindows Version- HwPlatformarm64
   MicrosoftWindows Version- HwPlatformx86
DellDock Wd19 Firmware Update Utility Version < 01.00.28
   LinuxLinux Kernel Version-
   MicrosoftWindows Version- HwPlatformarm64
   MicrosoftWindows Version- HwPlatformx86
DellDock Wd22tb4 Firmware Update Utility Version < 01.00.28
   LinuxLinux Kernel Version-
   MicrosoftWindows Version- HwPlatformarm64
   MicrosoftWindows Version- HwPlatformx86
DellDock Wd22tb4 Firmware Update Utility Version < 01.00.44
   LinuxLinux Kernel Version-
   MicrosoftWindows Version- HwPlatformarm64
   MicrosoftWindows Version- HwPlatformx86
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.02% 0.024
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 6.7 0.8 5.9
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
security_alert@emc.com 6.3 0.3 5.9
CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
CWE-59 Improper Link Resolution Before File Access ('Link Following')

The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.

CWE-61 UNIX Symbolic Link (Symlink) Following

The product, when opening a file or directory, does not sufficiently account for when the file is a symbolic link that resolves to a target outside of the intended control sphere. This could allow an attacker to cause the product to operate on unauthorized files.