CVE-2025-38747

7.8 HIGH

📋 TL;DR

Dell SupportAssist OS Recovery versions before 5.5.14.0 create temporary files with insecure permissions, allowing local authenticated attackers to modify these files and potentially gain elevated privileges. This affects Dell systems running vulnerable versions of the software, requiring an attacker to have local access and valid credentials.

💻 Affected Systems

Products:
  • Dell SupportAssist OS Recovery
Versions: All versions prior to 5.5.14.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Dell SupportAssist OS Recovery installed. Requires local authenticated access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could achieve full system compromise by replacing temporary files with malicious executables that run with elevated privileges, potentially gaining administrative control over the system.

🟠

Likely Case

A local user with standard privileges could exploit this to gain administrative rights on their own system, enabling installation of malware, data theft, or persistence mechanisms.

🟢

If Mitigated

With proper access controls and monitoring, exploitation would be limited to authorized users who already have some level of system access, reducing the overall risk.

🌐 Internet-Facing: LOW - This vulnerability requires local authenticated access, making remote exploitation unlikely without additional attack vectors.
🏢 Internal Only: HIGH - Internal users with valid credentials on affected systems could exploit this to escalate privileges, posing significant risk in enterprise environments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local authenticated access and knowledge of temporary file creation patterns. No public exploits have been reported as of the advisory date.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.5.14.0

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000353093/dsa-2025-315

Restart Required: Yes

Instructions:

1. Download Dell SupportAssist OS Recovery version 5.5.14.0 or later from Dell's support site. 2. Run the installer with administrative privileges. 3. Follow the installation prompts. 4. Restart the system when prompted.

🔧 Temporary Workarounds

Uninstall SupportAssist OS Recovery

windows

Remove the vulnerable software entirely if not required for system functionality.

Control Panel > Programs > Uninstall a program > Select 'Dell SupportAssist OS Recovery' > Uninstall

Restrict Local Access

windows

Limit local user accounts and implement strict access controls to reduce attack surface.

🧯 If You Can't Patch

  • Implement strict least-privilege access controls to limit which users can log in locally
  • Monitor for suspicious file creation/modification in temporary directories and implement application whitelisting

🔍 How to Verify

Check if Vulnerable:

Check the installed version of Dell SupportAssist OS Recovery in Control Panel > Programs and Features. If version is below 5.5.14.0, the system is vulnerable.

Check Version:

wmic product where "name like 'Dell SupportAssist OS Recovery%'" get version

Verify Fix Applied:

After updating, verify the version shows 5.5.14.0 or higher in Control Panel > Programs and Features.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file creation/modification in temporary directories by SupportAssist processes
  • Multiple failed privilege escalation attempts followed by successful elevation

Network Indicators:

  • No specific network indicators as this is a local vulnerability

SIEM Query:

EventID=4688 AND ProcessName LIKE '%SupportAssist%' AND CommandLine LIKE '%temp%'

🔗 References

📤 Share & Export