Dell Command Configure versions before 4.2.1 contain an uncontrolled search path vulnerability. A locally authenticated malicious user could exploit this vulnerability by creating a symlink to a target file, allowing the malicious user to overwrite or corrupt a specified file on the system.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
dell command\\|configure |