Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-46685: CWE-378: Creation of Temporary File With Insecure Permissions in Dell SupportAssist OS Recovery

0
High
VulnerabilityCVE-2025-46685cvecve-2025-46685cwe-378
Published: Tue Jan 13 2026 (01/13/2026, 16:36:41 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: SupportAssist OS Recovery

Description

CVE-2025-46685 is a high-severity vulnerability in Dell SupportAssist OS Recovery prior to version 5. 5. 15. 1, involving the creation of temporary files with insecure permissions. This flaw allows a low-privileged local attacker to exploit the improper file permissions to escalate privileges on the affected system. The vulnerability requires local access, user interaction, and has a high complexity for exploitation, but successful exploitation can lead to full confidentiality, integrity, and availability compromise. There are no known exploits in the wild yet, and no patches have been linked at the time of publication. European organizations using Dell systems with SupportAssist OS Recovery are at risk, especially in countries with high Dell market penetration and critical infrastructure relying on these systems. Mitigation should focus on applying updates once available, restricting local access, and monitoring for suspicious file permission changes. Countries like Germany, the UK, France, and the Netherlands are most likely affected due to their large enterprise IT environments and Dell usage.

AI-Powered Analysis

AILast updated: 01/21/2026, 02:44:20 UTC

Technical Analysis

CVE-2025-46685 is a vulnerability classified under CWE-378, which pertains to the creation of temporary files with insecure permissions. This security flaw exists in Dell SupportAssist OS Recovery versions prior to 5.5.15.1. The vulnerability allows a low-privileged attacker who has local access to the system to exploit the insecure permissions on temporary files created by the software. Because these files are created with overly permissive access rights, an attacker can potentially manipulate or replace these files to escalate their privileges on the system. The vulnerability requires local access and user interaction, and the attack complexity is high, meaning it is not trivial to exploit but feasible under certain conditions. The CVSS v3.1 base score is 7.5, indicating a high severity with impacts on confidentiality, integrity, and availability (all rated high). The scope is changed, meaning the vulnerability affects resources beyond the initially vulnerable component. No known exploits are currently in the wild, and no official patches have been linked yet, though Dell is expected to release updates. The vulnerability is significant because SupportAssist OS Recovery is commonly pre-installed on many Dell systems, often used in enterprise environments for system recovery and diagnostics, making the potential impact broad if exploited.

Potential Impact

For European organizations, this vulnerability poses a significant risk due to the widespread use of Dell hardware and SupportAssist OS Recovery in enterprise and governmental environments. Successful exploitation could allow attackers to gain elevated privileges, potentially leading to unauthorized access to sensitive data, modification or deletion of critical system files, and disruption of system availability. This could impact confidentiality, integrity, and availability of systems, leading to data breaches, operational downtime, and loss of trust. Organizations in sectors such as finance, healthcare, and critical infrastructure are particularly vulnerable due to the sensitive nature of their data and the criticality of their systems. The requirement for local access limits remote exploitation but raises concerns about insider threats or attackers gaining physical or remote desktop access. The lack of a patch at the time of disclosure increases the window of exposure, emphasizing the need for immediate mitigation steps.

Mitigation Recommendations

1. Monitor Dell’s official channels closely for the release of patches addressing CVE-2025-46685 and apply them promptly once available. 2. Restrict local access to systems running Dell SupportAssist OS Recovery to trusted personnel only, using strong physical security controls and endpoint access management. 3. Implement strict file system permission auditing and monitoring to detect unauthorized changes to temporary files or unusual file creation patterns. 4. Use application whitelisting and endpoint protection solutions to prevent unauthorized execution of code that could exploit this vulnerability. 5. Educate users about the risks of local privilege escalation and enforce policies to minimize unnecessary user privileges. 6. Consider disabling or uninstalling SupportAssist OS Recovery if it is not essential for business operations until a patch is available. 7. Employ network segmentation to limit the spread of an attacker who gains local access to one system. 8. Conduct regular security assessments and penetration tests focusing on local privilege escalation vectors to identify and remediate similar weaknesses.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
dell
Date Reserved
2025-04-27T05:03:57.128Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69667940a60475309f8fa68e

Added to database: 1/13/2026, 4:56:32 PM

Last enriched: 1/21/2026, 2:44:20 AM

Last updated: 2/7/2026, 8:25:05 AM

Views: 24

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats