A critical vulnerability has been discovered in Dell’s SupportAssist software, which affects both Home and Business PCs. Tracked as CVE-2024-52535, this vulnerability has raised alarms among cybersecurity experts due to its potential to escalate privileges on vulnerable systems. The flaw is present in versions of SupportAssist for Home PCs prior to 4.6.2 and for Business PCs prior to 4.5.1. It is tied to a symbolic link (symlink) attack in the software’s remediation component, which could be exploited by low-privileged authenticated users to gain elevated access.
Exploiting this vulnerability allows attackers to perform unauthorized actions on affected systems, such as the arbitrary deletion of critical files and folders. This poses a significant risk to system integrity and operational continuity, as it could lead to the destruction of important data and render systems inoperable. With a CVSS base score of 7.1, this vulnerability is classified as high severity, requiring immediate attention from affected users and organizations.
Dell Technologies has issued a patch to address this flaw, with updated versions of SupportAssist for Home PCs (4.6.2 or later) and Business PCs (4.5.1 or later). Users are strongly urged to update to these versions as soon as possible to mitigate the risk associated with CVE-2024-52535. The update addresses the symlink attack and significantly reduces the chances of an attacker exploiting the vulnerability to escalate privileges and cause harm to the system.
To further enhance security, Dell recommends that users review their access controls, monitor for suspicious activity, and ensure that all devices are running the latest security patches. Regular software maintenance is essential to prevent the exploitation of existing or future vulnerabilities. Dell’s proactive disclosure of this vulnerability underlines the importance of timely software updates and vigilance in maintaining a secure IT environment.
Reference: