CVE-2022-29094

7.1 HIGH

📋 TL;DR

This vulnerability allows authenticated non-admin users to delete or overwrite arbitrary files on systems running vulnerable versions of Dell SupportAssist. It affects both consumer and commercial versions of the software, potentially leading to system instability or privilege escalation.

💻 Affected Systems

Products:
  • Dell SupportAssist for Home PCs
  • Dell SupportAssist for Business PCs
Versions: Consumer versions 3.10.4 and prior, Commercial versions 3.1.1 and prior
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both consumer and commercial versions. Requires authenticated user access (non-admin).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could delete critical system files causing OS corruption, overwrite configuration files to gain persistence, or delete security software to disable protections.

🟠

Likely Case

Malicious insiders or compromised user accounts could delete user data, overwrite configuration files, or disrupt system operations.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to file deletion/overwrite within the compromised user's context.

🌐 Internet-Facing: LOW - Requires authenticated access, not directly exploitable from internet.
🏢 Internal Only: MEDIUM - Internal attackers with valid credentials can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated user access but no admin privileges. Exploitation likely involves simple file manipulation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Consumer: 3.10.5 or later, Commercial: 3.1.2 or later

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000200456/dsa-2022-139-dell-supportassist-for-home-pcs-and-business-pcs-security-update-for-multiple-security-vulnerabilities

Restart Required: Yes

Instructions:

1. Open Dell SupportAssist. 2. Check for updates in settings. 3. Install available updates. 4. Restart system. Alternatively, download from Dell Support website.

🔧 Temporary Workarounds

Uninstall SupportAssist

windows

Remove vulnerable software entirely if not needed

Control Panel > Programs > Uninstall a program > Select Dell SupportAssist > Uninstall

Restrict User Permissions

windows

Limit non-admin user access to systems with SupportAssist

🧯 If You Can't Patch

  • Monitor file deletion events in Windows Event Logs for suspicious activity
  • Implement strict access controls to limit which users can access systems with vulnerable SupportAssist

🔍 How to Verify

Check if Vulnerable:

Check SupportAssist version: Open SupportAssist > Settings > About. Compare version against affected ranges.

Check Version:

wmic product where "name like 'Dell SupportAssist%'" get version

Verify Fix Applied:

Verify version is Consumer 3.10.5+ or Commercial 3.1.2+. Test file operations from non-admin account.

📡 Detection & Monitoring

Log Indicators:

  • Windows Security Event ID 4663 (File deletion) from non-admin users targeting system files
  • Application logs showing SupportAssist file operations

Network Indicators:

  • No network indicators - local exploitation only

SIEM Query:

EventID=4663 AND SubjectUserName NOT IN (admin_users) AND ObjectName LIKE '%system32%' OR '%program files%'

🔗 References

📤 Share & Export