Lucene search

K
cveDellCVE-2021-36286
HistorySep 28, 2021 - 8:15 p.m.

CVE-2021-36286

2021-09-2820:15:07
CWE-22
CWE-59
dell
web.nvd.nist.gov
34
cve-2021-36286
dell
supportassist
client consumer
arbitrary file deletion
ntfs
symbolic links
vulnerability
security

CVSS2

3.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:N/I:P/A:P

CVSS3

7.1

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

AI Score

6.9

Confidence

High

EPSS

0

Percentile

9.9%

Dell SupportAssist Client Consumer versions 3.9.13.0 and any versions prior to 3.9.13.0 contain an arbitrary file deletion vulnerability that can be exploited by using the Windows feature of NTFS called Symbolic links. Symbolic links can be created by any(non-privileged) user under some object directories, but by themselves are not sufficient to successfully escalate privileges. However, combining them with a different object, such as the NTFS junction point allows for the exploitation. Support assist clean files functionality do not distinguish junction points from the physical folder and proceeds to clean the target of the junction that allows nonprivileged users to create junction points and delete arbitrary files on the system which can be accessed only by the admin.

Affected configurations

Nvd
Vulners
Node
dellsupportassist_client_consumerRange3.9.13.0
VendorProductVersionCPE
dellsupportassist_client_consumer*cpe:2.3:a:dell:supportassist_client_consumer:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "SupportAssist Client Consumer",
    "vendor": "Dell",
    "versions": [
      {
        "lessThanOrEqual": "3.9.13.0",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  }
]

CVSS2

3.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:N/I:P/A:P

CVSS3

7.1

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

AI Score

6.9

Confidence

High

EPSS

0

Percentile

9.9%

Related for CVE-2021-36286