CVE-2025-38738

6.7 MEDIUM

📋 TL;DR

This vulnerability allows a low-privileged local attacker to gain elevated privileges through the Dell SupportAssist installer. It affects users running SupportAssist for Home PCs versions 4.8.2.29006 and earlier. The attacker needs local access to the system to exploit this privilege escalation flaw.

💻 Affected Systems

Products:
  • Dell SupportAssist for Home PCs
Versions: 4.8.2.29006 and prior
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Dell SupportAssist for Home PCs installed. Business PCs version may have separate advisory.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains full administrative control over the system, allowing installation of malware, data theft, or complete system compromise.

🟠

Likely Case

Local user or malware with limited privileges escalates to administrator rights to persist on the system or bypass security controls.

🟢

If Mitigated

With proper user privilege separation and endpoint protection, exploitation attempts are detected and blocked before privilege escalation occurs.

🌐 Internet-Facing: LOW - This requires local access and cannot be exploited remotely.
🏢 Internal Only: MEDIUM - Insider threats or malware that gains initial foothold could exploit this for privilege escalation within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and some technical knowledge of privilege escalation techniques. No public exploit code available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 4.8.3 or later

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000356690/dsa-2025-296-security-update-for-dell-supportassist-for-home-pcs-and-dell-supportassist-for-business-pcs-vulnerabilities

Restart Required: No

Instructions:

1. Open Dell SupportAssist application. 2. Check for updates in settings. 3. Install available updates. 4. Alternatively, download latest version from Dell's official website.

🔧 Temporary Workarounds

Remove vulnerable software

Windows

Uninstall Dell SupportAssist for Home PCs if not required

Control Panel > Programs > Uninstall a program > Select 'Dell SupportAssist' > Uninstall

🧯 If You Can't Patch

  • Implement least privilege principle - ensure users operate with minimal necessary permissions
  • Deploy endpoint detection and response (EDR) solutions to monitor for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check SupportAssist version in application settings or via 'Programs and Features' in Control Panel

Check Version:

wmic product where name='Dell SupportAssist' get version

Verify Fix Applied:

Verify version is 4.8.3 or higher in application settings

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing unexpected privilege escalation
  • Process creation events with unexpected parent-child relationships involving SupportAssist

Network Indicators:

  • None - local privilege escalation only

SIEM Query:

EventID=4688 AND ProcessName LIKE '%SupportAssist%' AND NewProcessName LIKE '%cmd.exe%' OR NewProcessName LIKE '%powershell.exe%'

🔗 References

📤 Share & Export