PrivEsc via ACL on Non-Default Inst Dir in Dell Encryption <11.9.0
CVE-2023-32479 Published on February 6, 2024
Dell Encryption, Dell Endpoint Security Suite Enterprise, and Dell Security Management Server versions prior to 11.9.0 contain privilege escalation vulnerability due to improper ACL of the non-default installation directory. A local malicious user could potentially exploit this vulnerability by replacing binaries in installed directory and taking reverse shell of the system leading to Privilege Escalation.
Vulnerability Analysis
CVE-2023-32479 can be exploited with local system access, requires user interaction and a small amount of user privileges. This vulnerability is consided to have a high level of attack complexity. The potential impact of an exploit of this vulnerability is considered to be very high.
Weakness Type
What is an Authorization Vulnerability?
The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
CVE-2023-32479 has been classified to as an Authorization vulnerability or weakness.
Products Associated with CVE-2023-32479
stack.watch emails you whenever new vulnerabilities are published in Dell Encryption or Dell Endpoint Security Suite Enterprise. Just hit a watch button to start following.
Affected Versions
Dell Encryption:- Before 11.9.0 is affected.
- Before 11.9.0 is affected.
- Before 11.9.0 is affected.
- Before 11.9.0 is affected.
- Before 11.9.0 is affected.
- Before 11.9.0 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.