2023-11-16 11:00:21 +00:00
{
"id" : "CVE-2023-39259" ,
"sourceIdentifier" : "security_alert@emc.com" ,
"published" : "2023-11-16T09:15:07.473" ,
2023-11-23 05:00:22 +00:00
"lastModified" : "2023-11-23T03:29:34.637" ,
"vulnStatus" : "Analyzed" ,
2023-11-16 11:00:21 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "\nDell OS Recovery Tool, versions 2.2.4013, 2.3.7012.0, and 2.3.7515.0 contain an Improper Access Control Vulnerability. A local authenticated non-administrator user could potentially exploit this vulnerability, leading to the elevation of privilege on the system.\n\n"
2023-11-16 15:00:22 +00:00
} ,
{
"lang" : "es" ,
"value" : "Dell OS Recovery Tool en versiones 2.2.4013, 2.3.7012.0 y 2.3.7515.0, contienen una vulnerabilidad de control de acceso inadecuado. Un usuario local autenticado que no sea administrador podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda la elevaci\u00f3n de privilegios en el sistema."
2023-11-16 11:00:21 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
2023-11-23 05:00:22 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 7.8 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 1.8 ,
"impactScore" : 5.9
} ,
2023-11-16 11:00:21 +00:00
{
"source" : "security_alert@emc.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" ,
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "REQUIRED" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 7.3 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 1.3 ,
"impactScore" : 5.9
}
]
} ,
"weaknesses" : [
2023-11-23 05:00:22 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-Other"
}
]
} ,
2023-11-16 11:00:21 +00:00
{
"source" : "security_alert@emc.com" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-284"
}
]
}
] ,
2023-11-23 05:00:22 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:dell:os_recovery_tool:2.2.4013:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "27D7466E-1ADC-4C9C-9AD8-77021108838F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:dell:os_recovery_tool:2.3.7012.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "935BB4EC-A154-41EF-A7FB-7804081CF675"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:dell:os_recovery_tool:2.3.7515.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0CB25BEE-EED1-42F2-A32A-6D8E61C2967E"
}
]
}
]
}
] ,
2023-11-16 11:00:21 +00:00
"references" : [
{
"url" : "https://www.dell.com/support/kbdoc/en-us/000217078/dsa-2023-319dsa-2023-319" ,
2023-11-23 05:00:22 +00:00
"source" : "security_alert@emc.com" ,
"tags" : [
"Vendor Advisory"
]
2023-11-16 11:00:21 +00:00
}
]
}