CVE-2022-34388
📋 TL;DR
This vulnerability allows local low-privileged users to view and modify sensitive information in Dell SupportAssist's database. It affects both Home and Business PC versions of Dell SupportAssist. The vulnerability represents an information disclosure risk that could expose system data to unauthorized users.
💻 Affected Systems
- Dell SupportAssist for Home PCs
- Dell SupportAssist for Business PCs
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
A malicious insider could access and modify sensitive system information, potentially enabling privilege escalation or exposing confidential data stored in the SupportAssist database.
Likely Case
Local users could view system information, configuration details, or diagnostic data that should be restricted, potentially enabling further attacks or information gathering.
If Mitigated
With proper access controls and patching, the risk is limited to authorized users only accessing their own system information.
🎯 Exploit Status
Exploitation requires local access with low privileges. No public exploit code has been identified.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Home PCs: 3.11.5 or later; Business PCs: 3.2.1 or later
Vendor Advisory: https://www.dell.com/support/kbdoc/000204114
Restart Required: Yes
Instructions:
1. Open Dell SupportAssist. 2. Check for updates in settings. 3. Install available updates. 4. Restart the system if prompted.
🔧 Temporary Workarounds
Restrict Local Access
windowsLimit physical and remote access to systems running vulnerable versions of SupportAssist
Disable SupportAssist
windowsTemporarily disable Dell SupportAssist until patching can be completed
sc config "Dell SupportAssist Agent" start= disabled
sc stop "Dell SupportAssist Agent"
🧯 If You Can't Patch
- Implement strict access controls to limit local user access to affected systems
- Monitor for unusual database access patterns or unauthorized local user activity
🔍 How to Verify
Check if Vulnerable:
Check Dell SupportAssist version in the application or via Control Panel > Programs and Features
Check Version:
wmic product where "name like 'Dell SupportAssist%'" get version
Verify Fix Applied:
Verify version is 3.11.5 or later for Home PCs, or 3.2.1 or later for Business PCs
📡 Detection & Monitoring
Log Indicators:
- Unusual database access patterns in SupportAssist logs
- Multiple failed or successful access attempts to SupportAssist database files
Network Indicators:
- Local connections to SupportAssist database files from unauthorized users
SIEM Query:
EventID=4688 AND ProcessName LIKE '%SupportAssist%' AND CommandLine LIKE '%database%'