Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-46685: CWE-378: Creation of Temporary File With Insecure Permissions in Dell SupportAssist OS Recovery

0
High
VulnerabilityCVE-2025-46685cvecve-2025-46685cwe-378
Published: Tue Jan 13 2026 (01/13/2026, 16:36:41 UTC)
Source: CVE Database V5
Vendor/Project: Dell
Product: SupportAssist OS Recovery

Description

Dell SupportAssist OS Recovery, versions prior to 5.5.15.1, contain a Creation of Temporary File With Insecure Permissions vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 07:26:38 UTC

Technical Analysis

CVE-2025-46685 is a vulnerability classified under CWE-378, which concerns the creation of temporary files with insecure permissions. This flaw exists in Dell SupportAssist OS Recovery software versions prior to 5.5.15.1. The vulnerability arises because the application creates temporary files that are accessible or modifiable by unauthorized users due to improper permission settings. A low-privileged attacker with local access to the affected system can exploit this weakness to perform a privilege escalation attack, potentially gaining higher system privileges than intended. The CVSS v3.1 base score is 7.5, indicating a high severity level. The vector string (AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H) shows that the attack requires local access (AV:L), high attack complexity (AC:H), low privileges (PR:L), and user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. Successful exploitation can lead to full compromise of confidentiality, integrity, and availability of the system. Although no public exploits are known at this time, the vulnerability poses a significant risk due to the critical nature of privilege escalation. Dell SupportAssist OS Recovery is a widely used recovery tool on Dell systems, making this vulnerability relevant to many enterprise and consumer environments.

Potential Impact

The primary impact of CVE-2025-46685 is the potential for local privilege escalation, which can allow attackers to gain administrative or system-level access on affected machines. This can lead to unauthorized access to sensitive data, modification or deletion of critical system files, installation of persistent malware, and disruption of system availability. Organizations relying on Dell SupportAssist OS Recovery for system recovery and maintenance could face increased risk of insider threats or attacks by malware that gains initial low-level access. The vulnerability undermines the security boundary between user and system privileges, increasing the attack surface. Given the widespread use of Dell hardware and associated recovery tools in corporate, government, and consumer sectors, the impact could be significant, especially in environments where local access controls are weak or where multiple users share systems. The lack of known exploits currently limits immediate risk, but the high severity score suggests that once exploit code is developed, rapid compromise could occur.

Mitigation Recommendations

To mitigate CVE-2025-46685, organizations should prioritize updating Dell SupportAssist OS Recovery to version 5.5.15.1 or later once patches are released by Dell. Until patches are available, restrict local access to systems running vulnerable versions by enforcing strict physical and logical access controls. Employ endpoint protection solutions that monitor for suspicious file creation and privilege escalation attempts. Configure system policies to limit the ability of low-privileged users to create or modify files in sensitive directories. Regularly audit file permissions on temporary directories used by SupportAssist OS Recovery to detect insecure settings. Educate users about the risks of executing untrusted code or scripts that could trigger exploitation. Implement application whitelisting and least privilege principles to reduce the attack surface. Monitor system logs for unusual activity related to temporary file creation or privilege changes. Finally, maintain an incident response plan that includes procedures for addressing privilege escalation incidents.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
dell
Date Reserved
2025-04-27T05:03:57.128Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69667940a60475309f8fa68e

Added to database: 1/13/2026, 4:56:32 PM

Last enriched: 2/27/2026, 7:26:38 AM

Last updated: 3/25/2026, 11:49:47 PM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses