6.2
CVSSv2

CVE-2019-3726

Published: 24/09/2019 Updated: 09/10/2019
CVSS v2 Base Score: 6.2 | Impact Score: 10 | Exploitability Score: 1.9
CVSS v3 Base Score: 6.7 | Impact Score: 5.9 | Exploitability Score: 0.8
VMScore: 553
Vector: AV:L/AC:H/Au:N/C:C/I:C/A:C

Vulnerability Summary

An Uncontrolled Search Path Vulnerability is applicable to the following: Dell Update Package (DUP) Framework file versions before 19.1.0.413, and Framework file versions before 103.4.6.69 used in Dell EMC Servers. Dell Update Package (DUP) Framework file versions before 3.8.3.67 used in Dell Client Platforms. The vulnerability is limited to the DUP framework during the time window when a DUP is being executed by an administrator. During this time window, a locally authenticated low privilege malicious user potentially could exploit this vulnerability by tricking an administrator into running a trusted binary, causing it to load a malicious DLL and allowing the malicious user to execute arbitrary code on the victim system. The vulnerability does not affect the actual binary payload that the DUP delivers.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

dell update_package_framework