CVE-2023-28047

7.3 HIGH

📋 TL;DR

Dell Display Manager versions 2.1.0 and earlier contain a privilege escalation vulnerability during installation. A local attacker with low privileges can create arbitrary files or folders, potentially leading to arbitrary code execution with SYSTEM/administrator privileges. This affects all systems running vulnerable versions of Dell Display Manager.

💻 Affected Systems

Products:
  • Dell Display Manager
Versions: 2.1.0 and prior
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists during installation process. Requires Dell Display Manager to be installed or reinstalled on the system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise via privilege escalation to SYSTEM/administrator, allowing complete control over the affected system, data theft, persistence, and lateral movement.

🟠

Likely Case

Local privilege escalation leading to installation of malware, credential theft, or system configuration changes by authenticated low-privilege users.

🟢

If Mitigated

Limited impact if proper access controls prevent local user access or if vulnerable software is not installed.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access to exploit.
🏢 Internal Only: HIGH - Any authenticated user on affected systems could potentially exploit this to gain administrative privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and knowledge of the vulnerability. Exploitation involves manipulating installation process to create arbitrary files/folders.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.1.1 or later

Vendor Advisory: https://www.dell.com/support/kbdoc/en-uk/000211727/dsa-2023

Restart Required: Yes

Instructions:

1. Download Dell Display Manager version 2.1.1 or later from Dell Support. 2. Uninstall current version. 3. Install updated version. 4. Restart system.

🔧 Temporary Workarounds

Restrict Local User Access

windows

Limit local user access to systems with Dell Display Manager installed to reduce attack surface.

Remove Vulnerable Software

windows

Uninstall Dell Display Manager if not required for business operations.

Control Panel > Programs > Uninstall a program > Select Dell Display Manager > Uninstall

🧯 If You Can't Patch

  • Implement strict access controls to limit local user access to affected systems
  • Monitor for suspicious file creation activities during software installation processes

🔍 How to Verify

Check if Vulnerable:

Check Dell Display Manager version in Control Panel > Programs > Programs and Features. If version is 2.1.0 or earlier, system is vulnerable.

Check Version:

wmic product where name="Dell Display Manager" get version

Verify Fix Applied:

Verify Dell Display Manager version is 2.1.1 or later in Control Panel > Programs > Programs and Features.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing unexpected file/folder creation during Dell Display Manager installation
  • Security logs showing privilege escalation attempts

Network Indicators:

  • No network indicators - local privilege escalation only

SIEM Query:

EventID=4688 AND ProcessName LIKE '%Dell Display Manager%' AND NewProcessName LIKE '%cmd.exe%' OR '%powershell.exe%'

🔗 References

📤 Share & Export