📦 Alienware Command Center

by Dell

🔍 What is Alienware Command Center?

Description coming soon...

🛡️ Security Overview

Click on a severity to filter vulnerabilities

⚠️ Known Vulnerabilities

CVE-2025-46369

HIGH CVSS 7.8 Nov 13, 2025

Dell Alienware Command Center versions before 6.10.15.0 have an insecure temporary file vulnerability that allows local low-privileged attackers to escalate privileges. This affects users running vuln...

CVE-2025-46367

HIGH CVSS 7.8 Nov 13, 2025

Dell Alienware Command Center versions before 6.10.15.0 contain a vulnerability where error conditions are detected but not properly handled. A local attacker with low privileges could exploit this to...

CVE-2024-22450

HIGH CVSS 7.4 Apr 10, 2024

Dell Alienware Command Center versions before 6.2.7.0 have a path traversal vulnerability where local attackers can place malicious files in the application's search path. This could allow privilege e...

CVE-2023-28072

HIGH CVSS 7.8 Sep 4, 2023

This vulnerability allows a local malicious user to exploit insecure deserialization in Dell Alienware Command Center to execute arbitrary code on the system. It affects users running versions prior t...

CVE-2023-24569

HIGH CVSS 7.8 Feb 10, 2023

This vulnerability allows a local authenticated malicious user to send malicious input to a named pipe in Dell Alienware Command Center, potentially leading to privilege escalation. It affects users r...

CVE-2025-46362

MEDIUM CVSS 6.6 Nov 13, 2025

Dell Alienware Command Center versions before 6.10.15.0 have an improper access control vulnerability that allows local low-privileged attackers to tamper with information. This affects users running ...

CVE-2025-43726

MEDIUM CVSS 6.7 Sep 2, 2025

Dell Alienware Command Center versions before 5.10.2.0 contain a link following vulnerability that allows local attackers with low privileges to elevate their privileges on the system. This affects us...

CVE-2025-30100

MEDIUM CVSS 6.7 Apr 16, 2025

Dell Alienware Command Center versions before 6.7.37.0 have an improper access control vulnerability that allows local low-privileged attackers to elevate their privileges. This affects users running ...