CVE-2025-46685: CWE-378: Creation of Temporary File With Insecure Permissions in Dell SupportAssist OS Recovery
Dell SupportAssist OS Recovery, versions prior to 5.5.15.1, contain a Creation of Temporary File With Insecure Permissions vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.
AI Analysis
Technical Summary
CVE-2025-46685 is a vulnerability classified under CWE-378, which concerns the creation of temporary files with insecure permissions. This flaw exists in Dell SupportAssist OS Recovery software versions prior to 5.5.15.1. The vulnerability arises because the application creates temporary files that are accessible or modifiable by unauthorized users due to improper permission settings. A low-privileged attacker with local access to the affected system can exploit this weakness to perform a privilege escalation attack, potentially gaining higher system privileges than intended. The CVSS v3.1 base score is 7.5, indicating a high severity level. The vector string (AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H) shows that the attack requires local access (AV:L), high attack complexity (AC:H), low privileges (PR:L), and user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. Successful exploitation can lead to full compromise of confidentiality, integrity, and availability of the system. Although no public exploits are known at this time, the vulnerability poses a significant risk due to the critical nature of privilege escalation. Dell SupportAssist OS Recovery is a widely used recovery tool on Dell systems, making this vulnerability relevant to many enterprise and consumer environments.
Potential Impact
The primary impact of CVE-2025-46685 is the potential for local privilege escalation, which can allow attackers to gain administrative or system-level access on affected machines. This can lead to unauthorized access to sensitive data, modification or deletion of critical system files, installation of persistent malware, and disruption of system availability. Organizations relying on Dell SupportAssist OS Recovery for system recovery and maintenance could face increased risk of insider threats or attacks by malware that gains initial low-level access. The vulnerability undermines the security boundary between user and system privileges, increasing the attack surface. Given the widespread use of Dell hardware and associated recovery tools in corporate, government, and consumer sectors, the impact could be significant, especially in environments where local access controls are weak or where multiple users share systems. The lack of known exploits currently limits immediate risk, but the high severity score suggests that once exploit code is developed, rapid compromise could occur.
Mitigation Recommendations
To mitigate CVE-2025-46685, organizations should prioritize updating Dell SupportAssist OS Recovery to version 5.5.15.1 or later once patches are released by Dell. Until patches are available, restrict local access to systems running vulnerable versions by enforcing strict physical and logical access controls. Employ endpoint protection solutions that monitor for suspicious file creation and privilege escalation attempts. Configure system policies to limit the ability of low-privileged users to create or modify files in sensitive directories. Regularly audit file permissions on temporary directories used by SupportAssist OS Recovery to detect insecure settings. Educate users about the risks of executing untrusted code or scripts that could trigger exploitation. Implement application whitelisting and least privilege principles to reduce the attack surface. Monitor system logs for unusual activity related to temporary file creation or privilege changes. Finally, maintain an incident response plan that includes procedures for addressing privilege escalation incidents.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, India, Japan, South Korea, Brazil, Mexico, Italy, Spain, Netherlands
CVE-2025-46685: CWE-378: Creation of Temporary File With Insecure Permissions in Dell SupportAssist OS Recovery
Description
Dell SupportAssist OS Recovery, versions prior to 5.5.15.1, contain a Creation of Temporary File With Insecure Permissions vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-46685 is a vulnerability classified under CWE-378, which concerns the creation of temporary files with insecure permissions. This flaw exists in Dell SupportAssist OS Recovery software versions prior to 5.5.15.1. The vulnerability arises because the application creates temporary files that are accessible or modifiable by unauthorized users due to improper permission settings. A low-privileged attacker with local access to the affected system can exploit this weakness to perform a privilege escalation attack, potentially gaining higher system privileges than intended. The CVSS v3.1 base score is 7.5, indicating a high severity level. The vector string (AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H) shows that the attack requires local access (AV:L), high attack complexity (AC:H), low privileges (PR:L), and user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. Successful exploitation can lead to full compromise of confidentiality, integrity, and availability of the system. Although no public exploits are known at this time, the vulnerability poses a significant risk due to the critical nature of privilege escalation. Dell SupportAssist OS Recovery is a widely used recovery tool on Dell systems, making this vulnerability relevant to many enterprise and consumer environments.
Potential Impact
The primary impact of CVE-2025-46685 is the potential for local privilege escalation, which can allow attackers to gain administrative or system-level access on affected machines. This can lead to unauthorized access to sensitive data, modification or deletion of critical system files, installation of persistent malware, and disruption of system availability. Organizations relying on Dell SupportAssist OS Recovery for system recovery and maintenance could face increased risk of insider threats or attacks by malware that gains initial low-level access. The vulnerability undermines the security boundary between user and system privileges, increasing the attack surface. Given the widespread use of Dell hardware and associated recovery tools in corporate, government, and consumer sectors, the impact could be significant, especially in environments where local access controls are weak or where multiple users share systems. The lack of known exploits currently limits immediate risk, but the high severity score suggests that once exploit code is developed, rapid compromise could occur.
Mitigation Recommendations
To mitigate CVE-2025-46685, organizations should prioritize updating Dell SupportAssist OS Recovery to version 5.5.15.1 or later once patches are released by Dell. Until patches are available, restrict local access to systems running vulnerable versions by enforcing strict physical and logical access controls. Employ endpoint protection solutions that monitor for suspicious file creation and privilege escalation attempts. Configure system policies to limit the ability of low-privileged users to create or modify files in sensitive directories. Regularly audit file permissions on temporary directories used by SupportAssist OS Recovery to detect insecure settings. Educate users about the risks of executing untrusted code or scripts that could trigger exploitation. Implement application whitelisting and least privilege principles to reduce the attack surface. Monitor system logs for unusual activity related to temporary file creation or privilege changes. Finally, maintain an incident response plan that includes procedures for addressing privilege escalation incidents.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- dell
- Date Reserved
- 2025-04-27T05:03:57.128Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69667940a60475309f8fa68e
Added to database: 1/13/2026, 4:56:32 PM
Last enriched: 2/27/2026, 7:26:38 AM
Last updated: 3/25/2026, 11:49:47 PM
Views: 58
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.