Skip to main content

CVE-2025-38747: CWE-378: Creation of Temporary File With Insecure Permissions in Dell SupportAssist OS Recovery

High
VulnerabilityCVE-2025-38747cvecve-2025-38747cwe-378
Published: Wed Aug 06 2025 (08/06/2025, 19:48:46 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: SupportAssist OS Recovery

Description

Dell SupportAssist OS Recovery, versions prior to 5.5.14.0, contain a Creation of Temporary File With Insecure Permissions vulnerability. A local authenticated attacker could potentially exploit this vulnerability, leading to Elevation of Privileges.

AI-Powered Analysis

AILast updated: 08/14/2025, 01:06:59 UTC

Technical Analysis

CVE-2025-38747 is a high-severity vulnerability identified in Dell SupportAssist OS Recovery versions prior to 5.5.14.0. The vulnerability is categorized under CWE-378, which pertains to the creation of temporary files with insecure permissions. Specifically, this flaw allows a local authenticated attacker to exploit the improper handling of temporary files by the SupportAssist OS Recovery software. By creating or manipulating temporary files that are accessible with overly permissive rights, an attacker can potentially escalate their privileges on the affected system. The vulnerability requires local access and authenticated user privileges, but does not require user interaction beyond authentication. The CVSS 3.1 base score is 7.8, reflecting high severity with the vector AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, indicating local attack vector, low attack complexity, low privileges required, no user interaction, unchanged scope, and high impact on confidentiality, integrity, and availability. The lack of known exploits in the wild suggests that exploitation is not yet widespread, but the potential impact remains significant due to the possibility of privilege escalation. The vulnerability affects Dell SupportAssist OS Recovery, a tool pre-installed or available on many Dell systems to assist with OS recovery and troubleshooting, which is often used in enterprise and consumer environments. The absence of patch links in the provided data suggests that remediation may require vendor updates or configuration changes once available. Overall, this vulnerability poses a serious risk to system security by enabling attackers with local access to gain elevated privileges, potentially leading to full system compromise or unauthorized access to sensitive data.

Potential Impact

For European organizations, this vulnerability presents a significant risk, especially in environments where Dell hardware and SupportAssist OS Recovery are deployed. The elevation of privileges can allow attackers to bypass security controls, install persistent malware, or exfiltrate sensitive information, impacting confidentiality, integrity, and availability of critical systems. Organizations in sectors such as finance, healthcare, government, and critical infrastructure, which often rely on Dell hardware, could face operational disruptions and data breaches if exploited. The local authentication requirement limits remote exploitation but insider threats or compromised user accounts could be leveraged to exploit this vulnerability. Additionally, the high impact on all security triad components means that successful exploitation could facilitate lateral movement within networks, increasing the scope of compromise. Given the widespread use of Dell systems in Europe, the vulnerability could affect a broad range of organizations, from SMEs to large enterprises, potentially leading to regulatory non-compliance issues under GDPR if personal data is exposed.

Mitigation Recommendations

To mitigate this vulnerability effectively, European organizations should first inventory all Dell systems running SupportAssist OS Recovery and verify their software versions. Immediate steps include restricting local user permissions to minimize the number of users with authenticated access capable of exploiting the flaw. Organizations should implement strict access controls and monitoring on systems with Dell SupportAssist OS Recovery installed. Until an official patch is released, consider disabling or uninstalling SupportAssist OS Recovery if it is not essential for business operations. Employ endpoint detection and response (EDR) solutions to monitor for suspicious activities indicative of privilege escalation attempts. Additionally, enforce the principle of least privilege across all user accounts and conduct regular audits of file system permissions, especially for temporary directories. Once Dell releases a patch or update, prioritize timely deployment across all affected systems. Finally, educate IT staff and users about the risks of local privilege escalation vulnerabilities and the importance of maintaining secure authentication practices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
dell
Date Reserved
2025-04-16T05:03:52.415Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6893b4e7ad5a09ad00f3acbc

Added to database: 8/6/2025, 8:02:47 PM

Last enriched: 8/14/2025, 1:06:59 AM

Last updated: 9/15/2025, 6:37:09 AM

Views: 38

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats