CVE-2023-39249

Description

Dell SupportAssist for Business PCs version 3.4.0 contains a local Authentication Bypass vulnerability that allows locally authenticated non-admin users to gain temporary privilege within the SupportAssist User Interface on their respective PC. The Run as Admin temporary privilege feature enables IT/System Administrators to perform driver scans and Dell-recommended driver installations without requiring them to log out of the local non-admin user session. However, the granted privilege is limited solely to the SupportAssist User Interface and automatically expires after 15 minutes.

Category

6.3
CVSS
Severity: Medium
CVSS 3.1 •
EPSS 0.01%
Vendor Advisory dell.com
Affected: Dell SupportAssist Client Consumer
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2023-39249?
CVE-2023-39249 has been scored as a medium severity vulnerability.
How to fix CVE-2023-39249?
To fix CVE-2023-39249, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2023-39249 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2023-39249 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2023-39249?
CVE-2023-39249 affects Dell SupportAssist Client Consumer.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.