CVE-2023-28072

7.8 HIGH

📋 TL;DR

This vulnerability allows a local malicious user to exploit insecure deserialization in Dell Alienware Command Center to execute arbitrary code on the system. It affects users running versions prior to 5.5.51.0 of the software. Attackers need local access to the system to exploit this vulnerability.

💻 Affected Systems

Products:
  • Dell Alienware Command Center
Versions: Versions prior to 5.5.51.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: The .NET Remoting server runs locally, making all default installations vulnerable to local attackers.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with administrative privileges, allowing installation of malware, data theft, or persistence mechanisms.

🟠

Likely Case

Local privilege escalation leading to unauthorized access to system resources and potential lateral movement within the network.

🟢

If Mitigated

Limited impact due to proper access controls and network segmentation restricting local attack surface.

🌐 Internet-Facing: LOW - Exploitation requires local access to the system, not directly reachable from the internet.
🏢 Internal Only: HIGH - Local attackers or compromised accounts can exploit this to gain elevated privileges on affected systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and knowledge of .NET Remoting deserialization techniques, but no authentication is needed once local access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.5.51.0 or later

Vendor Advisory: https://www.dell.com/support/kbdoc/en-in/000212982/dsa-2023-158

Restart Required: Yes

Instructions:

1. Download the latest version from Dell's official support site. 2. Run the installer as administrator. 3. Follow the installation prompts. 4. Restart the system when prompted.

🔧 Temporary Workarounds

Disable .NET Remoting Service

windows

Temporarily disable the vulnerable .NET Remoting server component

Stop-Service -Name "AWCCService" -Force
Set-Service -Name "AWCCService" -StartupType Disabled

🧯 If You Can't Patch

  • Restrict local user access to systems running vulnerable software
  • Implement network segmentation to limit lateral movement from compromised systems

🔍 How to Verify

Check if Vulnerable:

Check the installed version of Alienware Command Center in Windows Programs and Features or via PowerShell: Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like "*Alienware Command Center*"} | Select-Object Name, Version

Check Version:

Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like "*Alienware Command Center*"} | Select-Object Version

Verify Fix Applied:

Verify the version is 5.5.51.0 or higher using the same command and ensure the AWCCService is running properly.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from AWCCService.exe
  • Failed authentication attempts to local services
  • Unexpected network connections from the system

Network Indicators:

  • Unusual outbound connections from affected systems
  • Traffic patterns indicating lateral movement

SIEM Query:

Process Creation where Image contains "AWCCService.exe" and CommandLine contains unusual parameters

🔗 References

📤 Share & Export