Dell Command Monitor privilege escalation | CVE-2023-28068
NAME
__________
Dell Command Monitor privilege escalation
Platforms Affected:
Dell Command Monitor 10.9
Risk Level:
7.3
Exploitability:
Unproven
Consequences:
Gain Privileges
DESCRIPTION
__________
Dell Command Monitor could allow a local authenticated attacker to gain elevated privileges on the system, caused by an improper folder permission flaw. By writing to a protected directory when installed to a non-default path, an authenticated attacker could exploit this vulnerability to gain elevated privileges.
CVSS 3.0 Information
__________
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged
Access Vector:
Local
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
![Dell Command Monitor privilege escalation | CVE-2023-28068 1 Buy Me A Coffee](https://www.redpacketsecurity.com/wp-content/uploads/2022/10/buymeacoffee.png)
![Dell Command Monitor privilege escalation | CVE-2023-28068 2 Patreon](https://www.redpacketsecurity.com/wp-content/uploads/2021/01/Digital-Patreon-Wordmark_FieryCoralv2-1024x209.png)
To keep up to date follow us on the below channels.