Patching for Windows Mac Linux
CVE Vulnerabilities for Alienware Command Center Suite
CVE | Published | Severity | Details | Exploitability | Impact | Vector |
---|---|---|---|---|---|---|
CVE‑2024‑38301 | 2024‑07‑10 03:15:02 | HIGH (8) | Dell Alienware Command Center, version 5.7.3.0 and prior, contains an improper access control vulnerability. A low privileged attacker could potentially exploit this vulnerability, leading to denial of service on the local system and information disclosure. | 2 | 6 | LOCAL |
CVE‑2024‑22450 | 2024‑04‑10 07:15:09 | HIGH (7) | Dell Alienware Command Center, versions prior to 6.2.7.0, contain an uncontrolled search path element vulnerability. A local malicious user could potentially inject malicious files in the file search path, leading to system compromise. | 1 | 6 | LOCAL |
CVE‑2024‑0159 | 2024‑04‑10 07:15:08 | MEDIUM (7) | Dell Alienware Command Center, versions 5.5.52.0 and prior, contain improper access control vulnerability, leading to Denial of Service on local system. | 1 | 6 | LOCAL |
CVE‑2023‑28072 | 2023‑09‑04 16:15:08 | HIGH (8) | Dell Alienware Command Center, versions prior to 5.5.51.0, contain a deserialization of untrusted data vulnerability. A local malicious user could potentially send specially crafted requests to the .NET Remoting server to run arbitrary code on the system. | 2 | 6 | LOCAL |
CVE‑2023‑28070 | 2023‑05‑03 09:15:09 | HIGH (8) | Alienware Command Center Application, versions 5.5.43.0 and prior, contain an improper access control vulnerability. A local malicious user could potentially exploit this vulnerability during installation or update process leading to privilege escalation. | 2 | 6 | LOCAL |
CVE‑2023‑24569 | 2023‑02‑10 13:15:11 | HIGH (8) | Dell Alienware Command Center versions 5.5.37.0 and prior contain an Improper Input validation vulnerability. A local authenticated malicious user could potentially send malicious input to a named pipe in order to elevate privileges on the system. | 2 | 6 | LOCAL |
What applications does Lavawall® monitor?
Lavawall monitors patches for over 7,500 applications. This is a summary of the most popular applications.Click here for the full list.
Click the applications below for the current version and known vulnerabilities.
Logos are property of their respective trademark holders and are not affiliated with ThreeShield or Lavawall. We have not audited the security of most of the listed tools.
The above listing includes products that Lavawall® monitors through public information and/or proprietary statistical analysis.
Although we do have a partner relationship with some of the listed products and companies, they do not necessarily endorse Lavawall® or have integrations with our systems.