CVE Vulnerabilities for Alienware Command Center Suite
CVE | Published | Severity | Details | Exploitability | Impact | Vector |
---|---|---|---|---|---|---|
CVE‑2024‑38301 | 2024‑07‑10 03:15:02 | HIGH (8) | Dell Alienware Command Center, version 5.7.3.0 and prior, contains an improper access control vulnerability. A low privileged attacker could potentially exploit this vulnerability, leading to denial of service on the local system and information disclosure. | 2 | 6 | LOCAL |
CVE‑2024‑22450 | 2024‑04‑10 07:15:09 | HIGH (7) | Dell Alienware Command Center, versions prior to 6.2.7.0, contain an uncontrolled search path element vulnerability. A local malicious user could potentially inject malicious files in the file search path, leading to system compromise. | 1 | 6 | LOCAL |
CVE‑2024‑0159 | 2024‑04‑10 07:15:08 | MEDIUM (7) | Dell Alienware Command Center, versions 5.5.52.0 and prior, contain improper access control vulnerability, leading to Denial of Service on local system. | 1 | 6 | LOCAL |
CVE‑2023‑28072 | 2023‑09‑04 16:15:08 | HIGH (8) | Dell Alienware Command Center, versions prior to 5.5.51.0, contain a deserialization of untrusted data vulnerability. A local malicious user could potentially send specially crafted requests to the .NET Remoting server to run arbitrary code on the system. | 2 | 6 | LOCAL |
CVE‑2023‑28070 | 2023‑05‑03 09:15:09 | HIGH (8) | Alienware Command Center Application, versions 5.5.43.0 and prior, contain an improper access control vulnerability. A local malicious user could potentially exploit this vulnerability during installation or update process leading to privilege escalation. | 2 | 6 | LOCAL |
CVE‑2023‑24569 | 2023‑02‑10 13:15:11 | HIGH (8) | Dell Alienware Command Center versions 5.5.37.0 and prior contain an Improper Input validation vulnerability. A local authenticated malicious user could potentially send malicious input to a named pipe in order to elevate privileges on the system. | 2 | 6 | LOCAL |
View OS-specific patching for:
Windows Mac Linux
Logos, products, trade names, and company names are all the property of their respective trademark holders.
The above listing includes products that Lavawall® monitors through public information and/or proprietary statistical analysis.
Although we do have a partner relationship with some of the listed products and companies, they do not necessarily endorse Lavawall® or have integrations with our systems.