2024-07-31 10:03:12 +00:00
{
"id" : "CVE-2024-32857" ,
"sourceIdentifier" : "security_alert@emc.com" ,
"published" : "2024-07-31T09:15:03.297" ,
2024-08-08 22:03:14 +00:00
"lastModified" : "2024-08-08T21:10:04.773" ,
"vulnStatus" : "Analyzed" ,
2024-07-31 10:03:12 +00:00
"cveTags" : [ ] ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "Dell Peripheral Manager, versions prior to 1.7.6, contain an uncontrolled search path element vulnerability. An attacker could potentially exploit this vulnerability through preloading malicious DLL or symbolic link exploitation, leading to arbitrary code execution and escalation of privilege"
2024-07-31 14:03:14 +00:00
} ,
{
"lang" : "es" ,
"value" : "Dell Peripheral Manager, versiones anteriores a 1.7.6, contiene una vulnerabilidad de elemento de ruta de b\u00fasqueda no controlada. Un atacante podr\u00eda explotar esta vulnerabilidad mediante la precarga de una DLL maliciosa o la explotaci\u00f3n de enlaces simb\u00f3licos, lo que lleva a la ejecuci\u00f3n de c\u00f3digo arbitrario y la escalada de privilegios."
2024-07-31 10:03:12 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
2024-08-08 22:03:14 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 7.8 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 1.8 ,
"impactScore" : 5.9
} ,
2024-07-31 10:03:12 +00:00
{
"source" : "security_alert@emc.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" ,
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "REQUIRED" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 7.3 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 1.3 ,
"impactScore" : 5.9
}
]
} ,
"weaknesses" : [
{
"source" : "security_alert@emc.com" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-427"
}
]
}
] ,
2024-08-08 22:03:14 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:dell:peripheral_manager:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "1.7.6" ,
"matchCriteriaId" : "99B6BBE4-2845-44DA-BC9D-C80FB9537457"
}
]
}
]
}
] ,
2024-07-31 10:03:12 +00:00
"references" : [
{
"url" : "https://www.dell.com/support/kbdoc/en-us/000225474/dsa-2024-242" ,
2024-08-08 22:03:14 +00:00
"source" : "security_alert@emc.com" ,
"tags" : [
"Vendor Advisory"
]
2024-07-31 10:03:12 +00:00
}
]
}