PrivEsc via ACL on Non-Default Inst Dir in Dell Encryption <11.9.0
CVE-2023-32479 Published on February 6, 2024

Dell Encryption, Dell Endpoint Security Suite Enterprise, and Dell Security Management Server versions prior to 11.9.0 contain privilege escalation vulnerability due to improper ACL of the non-default installation directory. A local malicious user could potentially exploit this vulnerability by replacing binaries in installed directory and taking reverse shell of the system leading to Privilege Escalation.

Vendor Advisory NVD

Vulnerability Analysis

CVE-2023-32479 can be exploited with local system access, requires user interaction and a small amount of user privileges. This vulnerability is consided to have a high level of attack complexity. The potential impact of an exploit of this vulnerability is considered to be very high.

Attack Vector:
LOCAL
Attack Complexity:
HIGH
Privileges Required:
LOW
User Interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality Impact:
HIGH
Integrity Impact:
HIGH
Availability Impact:
HIGH

Weakness Type

What is an Authorization Vulnerability?

The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

CVE-2023-32479 has been classified to as an Authorization vulnerability or weakness.


Products Associated with CVE-2023-32479

stack.watch emails you whenever new vulnerabilities are published in Dell Encryption or Dell Endpoint Security Suite Enterprise. Just hit a watch button to start following.

 
 

Affected Versions

Dell Encryption: Dell Endpoint Security Suite Enterprise: Dell Security Management Server (Windows): dell security_management_server: dell endpoint_security_suite_enterprise: dell encryption:

Exploit Probability

EPSS
0.04%
Percentile
13.11%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.