CVE-2025-46685
📋 TL;DR
Dell SupportAssist OS Recovery versions before 5.5.15.1 create temporary files with insecure permissions, allowing local low-privileged attackers to modify these files and potentially gain elevated privileges. This affects Dell systems running vulnerable versions of the SupportAssist OS Recovery software. The vulnerability requires local access to exploit.
💻 Affected Systems
- Dell SupportAssist OS Recovery
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Local attacker gains full system administrator/root privileges, enabling complete system compromise, data theft, malware installation, and persistence.
Likely Case
Local user or malware with limited privileges escalates to higher privileges, potentially accessing sensitive data or installing additional malicious software.
If Mitigated
With proper access controls and monitoring, exploitation attempts are detected and blocked, limiting impact to isolated incidents.
🎯 Exploit Status
Exploitation requires local access and low privileges. The CWE-378 pattern suggests relatively straightforward file manipulation attacks.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 5.5.15.1
Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000401506/dsa-2025-456
Restart Required: Yes
Instructions:
1. Open Dell SupportAssist. 2. Check for updates in the software. 3. Install version 5.5.15.1 or later. 4. Alternatively, download the update from Dell's support website. 5. Restart the system after installation.
🔧 Temporary Workarounds
Disable SupportAssist OS Recovery
windowsTemporarily disable the vulnerable software until patching is possible
sc config "SupportAssistAgent" start= disabled
net stop SupportAssistAgent
Restrict local access
allImplement strict local access controls to limit who can interact with the system
🧯 If You Can't Patch
- Implement strict principle of least privilege for all user accounts
- Deploy application whitelisting to prevent unauthorized process execution
🔍 How to Verify
Check if Vulnerable:
Check SupportAssist OS Recovery version in the software interface or via 'wmic product get name,version' on Windows
Check Version:
wmic product where "name like 'Dell SupportAssist%'" get name,version
Verify Fix Applied:
Confirm version is 5.5.15.1 or later in SupportAssist settings
📡 Detection & Monitoring
Log Indicators:
- Unusual file creation/modification in temporary directories by SupportAssist processes
- Unexpected privilege escalation events
Network Indicators:
- Not applicable - local vulnerability only
SIEM Query:
EventID=4688 AND ProcessName LIKE '%SupportAssist%' AND NewProcessName IN ('cmd.exe', 'powershell.exe', 'whoami.exe')