CVE-2021-36286

7.1 HIGH

📋 TL;DR

Dell SupportAssist Client Consumer versions prior to 3.9.13.0 contain an arbitrary file deletion vulnerability. Attackers can exploit NTFS symbolic links and junction points to delete arbitrary files on Windows systems, potentially disrupting system functionality. This affects all users running vulnerable versions of Dell SupportAssist on Windows.

💻 Affected Systems

Products:
  • Dell SupportAssist Client Consumer
Versions: All versions prior to 3.9.13.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows systems due to NTFS symbolic link/junction point exploitation. Requires Dell SupportAssist to be installed and running.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through deletion of critical system files, leading to OS corruption, data loss, or denial of service requiring system reinstallation.

🟠

Likely Case

Targeted deletion of user files, application data, or configuration files causing application failures, data loss, or system instability.

🟢

If Mitigated

Limited impact to non-critical files if proper access controls and monitoring are in place, with potential for detection before significant damage.

🌐 Internet-Facing: LOW - This vulnerability requires local access to the system and cannot be exploited remotely over the internet.
🏢 Internal Only: HIGH - Any user with local access (including standard users) can exploit this vulnerability to delete files, making internal threats significant.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local user access but no administrative privileges. The technique combining NTFS symbolic links and junction points is well-documented and relatively simple to implement.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.9.13.0 and later

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000191057/dsa-2021-163-dell-supportassist-client-consumer-security-update-for-two-vulnerabilities

Restart Required: Yes

Instructions:

1. Open Dell SupportAssist. 2. Check for updates in settings. 3. Download and install version 3.9.13.0 or later. 4. Restart the system. Alternatively, download directly from Dell's support website.

🔧 Temporary Workarounds

Disable Dell SupportAssist

windows

Temporarily disable the vulnerable application until patching is possible

sc stop "Dell SupportAssist Agent"
sc config "Dell SupportAssist Agent" start= disabled

Remove vulnerable version

windows

Uninstall the vulnerable version of Dell SupportAssist

appwiz.cpl
Select 'Dell SupportAssist' and click Uninstall

🧯 If You Can't Patch

  • Restrict local user access to systems with vulnerable versions installed
  • Implement strict file system auditing and monitoring for unauthorized file deletion attempts

🔍 How to Verify

Check if Vulnerable:

Check Dell SupportAssist version in Control Panel > Programs and Features. If version is earlier than 3.9.13.0, the system is vulnerable.

Check Version:

wmic product where "name like 'Dell SupportAssist%'" get version

Verify Fix Applied:

Verify Dell SupportAssist version is 3.9.13.0 or later in Control Panel > Programs and Features.

📡 Detection & Monitoring

Log Indicators:

  • Windows Security Event Logs showing file deletion events from Dell SupportAssist process
  • Application logs showing Dell SupportAssist clean file operations

Network Indicators:

  • No network indicators - this is a local privilege escalation vulnerability

SIEM Query:

EventID=4663 AND ProcessName="*SupportAssist*" AND AccessMask="0x10000" (Delete)

🔗 References

📤 Share & Export