Vulnerability Description
Dell Command | Update, Dell Update, and Alienware Update versions 4.9.0, A01 and prior contain an Insecure Operation on Windows Junction / Mount Point vulnerability. A local malicious user could potentially exploit this vulnerability to create arbitrary folder leading to permanent Denial of Service (DOS).
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dell | Alienware Update | < 4.9.0 |
| Dell | Command Update | < 4.9.0 |
| Dell | Update | < 4.9.0 |
| Microsoft | Windows | - |
Related Weaknesses (CWE)
References
- https://www.dell.com/support/kbdoc/en-us/000213546/dsa-2023-170-dell-command-updPatchVendor Advisory
- https://www.dell.com/support/kbdoc/en-us/000213546/dsa-2023-170-dell-command-updPatchVendor Advisory
FAQ
What is CVE-2023-28071?
CVE-2023-28071 is a vulnerability with a CVSS score of 6.3 (MEDIUM). Dell Command | Update, Dell Update, and Alienware Update versions 4.9.0, A01 and prior contain an Insecure Operation on Windows Junction / Mount Point vulnerability. A local malicious user could pote...
How severe is CVE-2023-28071?
CVE-2023-28071 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-28071?
Check the references section above for vendor advisories and patch information. Affected products include: Dell Alienware Update, Dell Command Update, Dell Update, Microsoft Windows.