Vulnerabilites related to dell - wyse_5470_mobile_thin_client
Vulnerability from fkie_nvd
Published
2023-07-20 13:15
Modified
2024-11-21 08:03
Severity ?
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
Dell Wyse ThinOS versions prior to 2303 (9.4.1141) contain a sensitive information disclosure vulnerability. An unauthenticated malicious user with local access to the device could exploit this vulnerability to read sensitive information written to the log files.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
dell | wyse_thinos | 9.4.1141 | |
dell | latitude_3420 | - | |
dell | latitude_3440 | - | |
dell | latitude_5440 | - | |
dell | optiplex_3000_thin_client | - | |
dell | optiplex_5400 | - | |
dell | wyse_3040_thin_client | - | |
dell | wyse_5070_thin_client | - | |
dell | wyse_5470_all-in-one_thin_client | - | |
dell | wyse_5470_mobile_thin_client | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:wyse_thinos:9.4.1141:*:*:*:*:*:*:*", "matchCriteriaId": "E2948904-C750-4A0A-B8F8-74D481D5D9DE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:latitude_3420:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FB6E60F-F100-42BF-BC38-A38620EF8D2C", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:latitude_3440:-:*:*:*:*:*:*:*", "matchCriteriaId": "31C78A9B-65B4-4213-9A96-4E57CFA5B195", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:latitude_5440:-:*:*:*:*:*:*:*", "matchCriteriaId": "84EC8EA3-A91D-4D3B-B1A5-D650A526CAAE", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:optiplex_3000_thin_client:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C4B0B6B-7740-46D0-9FE0-3AFF8D9B4DDA", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:optiplex_5400:-:*:*:*:*:*:*:*", "matchCriteriaId": "F53D91BF-DA1C-4BFB-9E17-AB5266DB255F", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:wyse_3040_thin_client:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE7CF2EF-93B1-4026-B923-3E08324245BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:wyse_5070_thin_client:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1664E2E-057D-4A8F-B8FC-73EC25D48DBC", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:wyse_5470_all-in-one_thin_client:-:*:*:*:*:*:*:*", "matchCriteriaId": "3929B7A4-D181-4258-8722-57A751DB4CCC", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:wyse_5470_mobile_thin_client:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D9B6263-FF2F-428D-971B-48029951E62B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nDell Wyse ThinOS versions prior to 2303 (9.4.1141) contain a sensitive information disclosure vulnerability. An unauthenticated malicious user with local access to the device could exploit this vulnerability to read sensitive information written to the log files.\n\n" } ], "id": "CVE-2023-32446", "lastModified": "2024-11-21T08:03:22.130", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "security_alert@emc.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-07-20T13:15:10.917", "references": [ { "source": "security_alert@emc.com", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000215864/dsa-2023-247" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000215864/dsa-2023-247" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-312" } ], "source": "security_alert@emc.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-532" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-10-10 21:15
Modified
2024-11-21 07:09
Severity ?
6.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
4.9 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
4.9 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Summary
Dell Wyse ThinOS 2205 contains a Regular Expression Denial of Service Vulnerability in UI. An admin privilege attacker could potentially exploit this vulnerability, leading to denial-of-service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
dell | wyse_thinos | * | |
dell | latitude_3420 | - | |
dell | optiplex_3000_thin_client | - | |
dell | wyse_3040_thin_client | - | |
dell | wyse_5070_thin_client | - | |
dell | wyse_5470_all-in-one_thin_client | - | |
dell | wyse_5470_mobile_thin_client | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:wyse_thinos:*:*:*:*:*:*:*:*", "matchCriteriaId": "FFBCEFF3-9A1E-46C9-9CF5-F04B67839075", "versionEndExcluding": "9.3.2102", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:latitude_3420:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FB6E60F-F100-42BF-BC38-A38620EF8D2C", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:optiplex_3000_thin_client:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C4B0B6B-7740-46D0-9FE0-3AFF8D9B4DDA", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:wyse_3040_thin_client:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE7CF2EF-93B1-4026-B923-3E08324245BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:wyse_5070_thin_client:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1664E2E-057D-4A8F-B8FC-73EC25D48DBC", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:wyse_5470_all-in-one_thin_client:-:*:*:*:*:*:*:*", "matchCriteriaId": "3929B7A4-D181-4258-8722-57A751DB4CCC", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:wyse_5470_mobile_thin_client:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D9B6263-FF2F-428D-971B-48029951E62B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dell Wyse ThinOS 2205 contains a Regular Expression Denial of Service Vulnerability in UI. An admin privilege attacker could potentially exploit this vulnerability, leading to denial-of-service." }, { "lang": "es", "value": "Dell Wyse ThinOS versi\u00f3n 2205, contiene una vulnerabilidad de Denegaci\u00f3n de Servicio por Expresi\u00f3n Regular en la Interfaz de Usuario. Un atacante con privilegios de administrador podr\u00eda explotar esta vulnerabilidad, conllevando a una denegaci\u00f3n de servicio" } ], "id": "CVE-2022-34402", "lastModified": "2024-11-21T07:09:27.007", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 4.0, "source": "security_alert@emc.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-10-10T21:15:11.067", "references": [ { "source": "security_alert@emc.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000203376/dsa-2022-247-dell-wyse-thinos-security-update-for-a-regular-expression-vulnerability" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000203376/dsa-2022-247-dell-wyse-thinos-security-update-for-a-regular-expression-vulnerability" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-1333" } ], "source": "security_alert@emc.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-1333" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-03-07 08:15
Modified
2025-07-01 15:08
Severity ?
Summary
Dell ThinOS 2411 and prior, contains an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary code execution.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:thinos:*:*:*:*:*:*:*:*", "matchCriteriaId": "6424032C-A6D9-4048-A769-873DEAE35BFA", "versionEndIncluding": "2411", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:latitude_3420:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FB6E60F-F100-42BF-BC38-A38620EF8D2C", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:latitude_3440:-:*:*:*:*:*:*:*", "matchCriteriaId": "31C78A9B-65B4-4213-9A96-4E57CFA5B195", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:latitude_5440:-:*:*:*:*:*:*:*", "matchCriteriaId": "84EC8EA3-A91D-4D3B-B1A5-D650A526CAAE", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:latitude_5450:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DAF60D4-BDA2-43ED-802D-CE3ACB548693", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:optiplex_3000_thin_client:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C4B0B6B-7740-46D0-9FE0-3AFF8D9B4DDA", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:optiplex_5400_all-in-one:-:*:*:*:*:*:*:*", "matchCriteriaId": "D08E685B-A29C-482E-989C-083B83E7C5CE", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:optiplex_7410_all-in-one:-:*:*:*:*:*:*:*", "matchCriteriaId": "802CD46E-86A4-4C9A-92DF-3297950D64B3", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:optiplex_7420_all-in-one:-:*:*:*:*:*:*:*", "matchCriteriaId": "E03807D5-B923-4CA3-A53E-C616846C9C6B", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:wyse_5070_thin_client:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1664E2E-057D-4A8F-B8FC-73EC25D48DBC", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:wyse_5470_all-in-one_thin_client:-:*:*:*:*:*:*:*", "matchCriteriaId": "3929B7A4-D181-4258-8722-57A751DB4CCC", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:wyse_5470_mobile_thin_client:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D9B6263-FF2F-428D-971B-48029951E62B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dell ThinOS 2411 and prior, contains an Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027) vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary code execution." }, { "lang": "es", "value": "Dell ThinOS 2411 y versiones anteriores contienen una vulnerabilidad de neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un comando (\u0027inyecci\u00f3n de comando\u0027). Un atacante con pocos privilegios y acceso local podr\u00eda aprovechar esta vulnerabilidad, lo que provocar\u00eda la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], "id": "CVE-2025-26331", "lastModified": "2025-07-01T15:08:21.283", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "security_alert@emc.com", "type": "Secondary" } ] }, "published": "2025-03-07T08:15:43.040", "references": [ { "source": "security_alert@emc.com", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000289886/dsa-2025-107" }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "tags": [ "Third Party Advisory" ], "url": "https://www.incibe.es/incibe-cert/alerta-temprana/vulnerabilidades/cve-2025-26331" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "security_alert@emc.com", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2023-07-20 13:15
Modified
2024-11-21 08:03
Severity ?
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
Dell Wyse ThinOS versions prior to 2208 (9.3.2102) contain a sensitive information disclosure vulnerability. An unauthenticated malicious user with local access to the device could exploit this vulnerability to read sensitive information written to the log files.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
dell | wyse_thinos | * | |
dell | latitude_3420 | - | |
dell | latitude_3440 | - | |
dell | latitude_5440 | - | |
dell | optiplex_3000_thin_client | - | |
dell | optiplex_5400 | - | |
dell | wyse_3040_thin_client | - | |
dell | wyse_5070_thin_client | - | |
dell | wyse_5470_all-in-one_thin_client | - | |
dell | wyse_5470_mobile_thin_client | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:wyse_thinos:*:*:*:*:*:*:*:*", "matchCriteriaId": "71B79A1C-C6CA-418C-B676-B5DD06B35054", "versionEndIncluding": "9.3.2102", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:latitude_3420:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FB6E60F-F100-42BF-BC38-A38620EF8D2C", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:latitude_3440:-:*:*:*:*:*:*:*", "matchCriteriaId": "31C78A9B-65B4-4213-9A96-4E57CFA5B195", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:latitude_5440:-:*:*:*:*:*:*:*", "matchCriteriaId": "84EC8EA3-A91D-4D3B-B1A5-D650A526CAAE", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:optiplex_3000_thin_client:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C4B0B6B-7740-46D0-9FE0-3AFF8D9B4DDA", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:optiplex_5400:-:*:*:*:*:*:*:*", "matchCriteriaId": "F53D91BF-DA1C-4BFB-9E17-AB5266DB255F", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:wyse_3040_thin_client:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE7CF2EF-93B1-4026-B923-3E08324245BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:wyse_5070_thin_client:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1664E2E-057D-4A8F-B8FC-73EC25D48DBC", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:wyse_5470_all-in-one_thin_client:-:*:*:*:*:*:*:*", "matchCriteriaId": "3929B7A4-D181-4258-8722-57A751DB4CCC", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:wyse_5470_mobile_thin_client:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D9B6263-FF2F-428D-971B-48029951E62B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nDell Wyse ThinOS versions prior to 2208 (9.3.2102) contain a sensitive information disclosure vulnerability. An unauthenticated malicious user with local access to the device could exploit this vulnerability to read sensitive information written to the log files.\n\n" } ], "id": "CVE-2023-32455", "lastModified": "2024-11-21T08:03:23.333", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "security_alert@emc.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-07-20T13:15:11.110", "references": [ { "source": "security_alert@emc.com", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000215864/dsa-2023-247" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000215864/dsa-2023-247" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-312" } ], "source": "security_alert@emc.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-532" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-03-18 16:15
Modified
2025-07-01 15:08
Severity ?
Summary
Dell ThinOS 2408 and prior, contains an improper permissions vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.
References
▶ | URL | Tags | |
---|---|---|---|
security_alert@emc.com | https://www.dell.com/support/kbdoc/en-us/000289886/dsa-2025-107 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:thinos:*:*:*:*:*:*:*:*", "matchCriteriaId": "4548306E-F9EB-401E-A5F2-628BC422897E", "versionEndIncluding": "2408", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:latitude_3420:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FB6E60F-F100-42BF-BC38-A38620EF8D2C", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:latitude_3440:-:*:*:*:*:*:*:*", "matchCriteriaId": "31C78A9B-65B4-4213-9A96-4E57CFA5B195", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:latitude_5440:-:*:*:*:*:*:*:*", "matchCriteriaId": "84EC8EA3-A91D-4D3B-B1A5-D650A526CAAE", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:latitude_5450:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DAF60D4-BDA2-43ED-802D-CE3ACB548693", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:optiplex_3000_thin_client:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C4B0B6B-7740-46D0-9FE0-3AFF8D9B4DDA", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:optiplex_5400_all-in-one:-:*:*:*:*:*:*:*", "matchCriteriaId": "D08E685B-A29C-482E-989C-083B83E7C5CE", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:optiplex_7410_all-in-one:-:*:*:*:*:*:*:*", "matchCriteriaId": "802CD46E-86A4-4C9A-92DF-3297950D64B3", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:optiplex_7420_all-in-one:-:*:*:*:*:*:*:*", "matchCriteriaId": "E03807D5-B923-4CA3-A53E-C616846C9C6B", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:wyse_5070_thin_client:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1664E2E-057D-4A8F-B8FC-73EC25D48DBC", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:wyse_5470_all-in-one_thin_client:-:*:*:*:*:*:*:*", "matchCriteriaId": "3929B7A4-D181-4258-8722-57A751DB4CCC", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:wyse_5470_mobile_thin_client:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D9B6263-FF2F-428D-971B-48029951E62B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dell ThinOS 2408 and prior, contains an improper permissions vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges." }, { "lang": "es", "value": "Dell ThinOS 2408 y versiones anteriores presentan una vulnerabilidad de permisos inadecuados. Un atacante con pocos privilegios y acceso local podr\u00eda explotar esta vulnerabilidad, lo que conllevar\u00eda una elevaci\u00f3n de privilegios." } ], "id": "CVE-2025-27688", "lastModified": "2025-07-01T15:08:57.517", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "security_alert@emc.com", "type": "Secondary" } ] }, "published": "2025-03-18T16:15:27.980", "references": [ { "source": "security_alert@emc.com", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000289886/dsa-2025-107" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-732" } ], "source": "security_alert@emc.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-07-20 13:15
Modified
2024-11-21 08:03
Severity ?
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
Dell Wyse ThinOS versions prior to 2306 (9.4.2103) contain a sensitive information disclosure vulnerability. A malicious user with local access to the device could exploit this vulnerability to read sensitive information written to the log files.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
dell | wyse_thinos | * | |
dell | latitude_3420 | - | |
dell | latitude_3440 | - | |
dell | latitude_5440 | - | |
dell | optiplex_3000_thin_client | - | |
dell | optiplex_5400 | - | |
dell | wyse_3040_thin_client | - | |
dell | wyse_5070_thin_client | - | |
dell | wyse_5470_all-in-one_thin_client | - | |
dell | wyse_5470_mobile_thin_client | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:wyse_thinos:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A4ACD90-97B4-47A0-97A4-4F8AB1D9A973", "versionEndExcluding": "9.4.2103", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:latitude_3420:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FB6E60F-F100-42BF-BC38-A38620EF8D2C", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:latitude_3440:-:*:*:*:*:*:*:*", "matchCriteriaId": "31C78A9B-65B4-4213-9A96-4E57CFA5B195", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:latitude_5440:-:*:*:*:*:*:*:*", "matchCriteriaId": "84EC8EA3-A91D-4D3B-B1A5-D650A526CAAE", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:optiplex_3000_thin_client:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C4B0B6B-7740-46D0-9FE0-3AFF8D9B4DDA", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:optiplex_5400:-:*:*:*:*:*:*:*", "matchCriteriaId": "F53D91BF-DA1C-4BFB-9E17-AB5266DB255F", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:wyse_3040_thin_client:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE7CF2EF-93B1-4026-B923-3E08324245BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:wyse_5070_thin_client:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1664E2E-057D-4A8F-B8FC-73EC25D48DBC", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:wyse_5470_all-in-one_thin_client:-:*:*:*:*:*:*:*", "matchCriteriaId": "3929B7A4-D181-4258-8722-57A751DB4CCC", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:wyse_5470_mobile_thin_client:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D9B6263-FF2F-428D-971B-48029951E62B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nDell Wyse ThinOS versions prior to 2306 (9.4.2103) contain a sensitive information disclosure vulnerability. A malicious user with local access to the device could exploit this vulnerability to read sensitive information written to the log files.\n\n" } ], "id": "CVE-2023-32447", "lastModified": "2024-11-21T08:03:22.270", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "security_alert@emc.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-07-20T13:15:11.020", "references": [ { "source": "security_alert@emc.com", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000215864/dsa-2023-247" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000215864/dsa-2023-247" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-312" } ], "source": "security_alert@emc.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-532" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2022-34402 (GCVE-0-2022-34402)
Vulnerability from cvelistv5
Published
2022-10-10 20:55
Modified
2024-09-16 23:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-1333 - Inefficient Regular Expression Complexity
Summary
Dell Wyse ThinOS 2205 contains a Regular Expression Denial of Service Vulnerability in UI. An admin privilege attacker could potentially exploit this vulnerability, leading to denial-of-service.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Dell | Wyse Proprietary OS (Modern ThinOS) |
Version: unspecified < ThinOS 2208 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:07:16.149Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000203376/dsa-2022-247-dell-wyse-thinos-security-update-for-a-regular-expression-vulnerability" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Wyse Proprietary OS (Modern ThinOS)", "vendor": "Dell", "versions": [ { "lessThan": "ThinOS 2208", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-09-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Dell Wyse ThinOS 2205 contains a Regular Expression Denial of Service Vulnerability in UI. An admin privilege attacker could potentially exploit this vulnerability, leading to denial-of-service." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1333", "description": "CWE-1333: Inefficient Regular Expression Complexity", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-10T00:00:00", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000203376/dsa-2022-247-dell-wyse-thinos-security-update-for-a-regular-expression-vulnerability" } ] } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2022-34402", "datePublished": "2022-10-10T20:55:09.661464Z", "dateReserved": "2022-06-23T00:00:00", "dateUpdated": "2024-09-16T23:26:01.289Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-32447 (GCVE-0-2023-32447)
Vulnerability from cvelistv5
Published
2023-07-20 12:55
Modified
2024-10-17 13:02
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-312 - Cleartext Storage of Sensitive Information
Summary
Dell Wyse ThinOS versions prior to 2306 (9.4.2103) contain a sensitive information disclosure vulnerability. A malicious user with local access to the device could exploit this vulnerability to read sensitive information written to the log files.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Dell | Wyse Proprietary OS (Modern ThinOS) |
Version: 2303(9.4.1141) and below |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:18:37.197Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000215864/dsa-2023-247" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-32447", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-17T13:01:51.350851Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-17T13:02:34.609Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Wyse Proprietary OS (Modern ThinOS)", "vendor": "Dell", "versions": [ { "status": "affected", "version": "2303(9.4.1141) and below" } ] } ], "datePublic": "2023-07-18T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell Wyse ThinOS versions prior to 2306 (9.4.2103) contain a sensitive information disclosure vulnerability. A malicious user with local access to the device could exploit this vulnerability to read sensitive information written to the log files.\u003c/span\u003e\n\n" } ], "value": "\nDell Wyse ThinOS versions prior to 2306 (9.4.2103) contain a sensitive information disclosure vulnerability. A malicious user with local access to the device could exploit this vulnerability to read sensitive information written to the log files.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-312", "description": "CWE-312: Cleartext Storage of Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-20T12:55:50.405Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000215864/dsa-2023-247" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2023-32447", "datePublished": "2023-07-20T12:55:50.405Z", "dateReserved": "2023-05-09T06:02:34.290Z", "dateUpdated": "2024-10-17T13:02:34.609Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-32446 (GCVE-0-2023-32446)
Vulnerability from cvelistv5
Published
2023-07-20 12:50
Modified
2024-10-17 14:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-312 - Cleartext Storage of Sensitive Information
Summary
Dell Wyse ThinOS versions prior to 2303 (9.4.1141) contain a sensitive information disclosure vulnerability. An unauthenticated malicious user with local access to the device could exploit this vulnerability to read sensitive information written to the log files.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Dell | Wyse Proprietary OS (Modern ThinOS) |
Version: 2303 (9.4.1141) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:18:37.105Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000215864/dsa-2023-247" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-32446", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-17T14:09:30.428461Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-17T14:12:16.678Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Wyse Proprietary OS (Modern ThinOS)", "vendor": "Dell", "versions": [ { "status": "affected", "version": "2303 (9.4.1141)" } ] } ], "datePublic": "2023-07-18T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell Wyse ThinOS versions prior to 2303 (9.4.1141) contain a sensitive information disclosure vulnerability. An unauthenticated malicious user with local access to the device could exploit this vulnerability to read sensitive information written to the log files.\u003c/span\u003e\n\n" } ], "value": "\nDell Wyse ThinOS versions prior to 2303 (9.4.1141) contain a sensitive information disclosure vulnerability. An unauthenticated malicious user with local access to the device could exploit this vulnerability to read sensitive information written to the log files.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-312", "description": "CWE-312: Cleartext Storage of Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-20T12:50:47.946Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000215864/dsa-2023-247" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2023-32446", "datePublished": "2023-07-20T12:50:47.946Z", "dateReserved": "2023-05-09T06:02:34.290Z", "dateUpdated": "2024-10-17T14:12:16.678Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-32455 (GCVE-0-2023-32455)
Vulnerability from cvelistv5
Published
2023-07-20 12:44
Modified
2024-10-17 14:11
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-312 - Cleartext Storage of Sensitive Information
Summary
Dell Wyse ThinOS versions prior to 2208 (9.3.2102) contain a sensitive information disclosure vulnerability. An unauthenticated malicious user with local access to the device could exploit this vulnerability to read sensitive information written to the log files.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Dell | Wyse Proprietary OS (Modern ThinOS) |
Version: 2208 (9.3.2102) and below |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:18:37.759Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000215864/dsa-2023-247" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-32455", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-17T14:09:35.432016Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-17T14:11:34.619Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Wyse Proprietary OS (Modern ThinOS)", "vendor": "Dell", "versions": [ { "status": "affected", "version": "2208 (9.3.2102) and below " } ] } ], "datePublic": "2023-07-18T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell Wyse ThinOS versions prior to 2208 (9.3.2102) contain a sensitive information disclosure vulnerability. An unauthenticated malicious user with local access to the device could exploit this vulnerability to read sensitive information written to the log files.\u003c/span\u003e\n\n" } ], "value": "\nDell Wyse ThinOS versions prior to 2208 (9.3.2102) contain a sensitive information disclosure vulnerability. An unauthenticated malicious user with local access to the device could exploit this vulnerability to read sensitive information written to the log files.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-312", "description": "CWE-312: Cleartext Storage of Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-20T12:44:50.291Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000215864/dsa-2023-247" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2023-32455", "datePublished": "2023-07-20T12:44:50.291Z", "dateReserved": "2023-05-09T06:02:34.291Z", "dateUpdated": "2024-10-17T14:11:34.619Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-27688 (GCVE-0-2025-27688)
Vulnerability from cvelistv5
Published
2025-03-18 15:55
Modified
2025-03-19 03:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-732 - Incorrect Permission Assignment for Critical Resource
Summary
Dell ThinOS 2408 and prior, contains an improper permissions vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Dell | Wyse Proprietary OS (Modern ThinOS) |
Version: N/A ≤ |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-27688", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-03-18T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-19T03:55:50.783Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Wyse Proprietary OS (Modern ThinOS)", "vendor": "Dell", "versions": [ { "lessThan": "ThinOS 2502", "status": "affected", "version": "N/A", "versionType": "semver" } ] } ], "datePublic": "2025-03-18T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Dell ThinOS 2408 and prior, contains an improper permissions vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.\u003cbr\u003e" } ], "value": "Dell ThinOS 2408 and prior, contains an improper permissions vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-732", "description": "CWE-732: Incorrect Permission Assignment for Critical Resource", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-18T15:55:44.470Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000289886/dsa-2025-107" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2025-27688", "datePublished": "2025-03-18T15:55:44.470Z", "dateReserved": "2025-03-05T07:33:28.315Z", "dateUpdated": "2025-03-19T03:55:50.783Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-26331 (GCVE-0-2025-26331)
Vulnerability from cvelistv5
Published
2025-03-07 08:06
Modified
2025-03-11 03:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-77 - Improper Neutralization of Special Elements used in a Command ('Command Injection')
Summary
Dell ThinOS 2411 and prior, contains an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary code execution.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Dell | Wyse Proprietary OS (Modern ThinOS) |
Version: N/A ≤ |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-26331", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-03-10T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-11T03:55:16.832Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "third-party-advisory" ], "url": "https://www.incibe.es/incibe-cert/alerta-temprana/vulnerabilidades/cve-2025-26331" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "ThinOS", "Latitude 3420", "Latitude 3440", "Latitude 5440", "Latitude 5450", "OptiPlex 3000 Thin Client", "OptiPlex 5400 All-in-One", "OptiPlex AIO 7410", "OptiPlex AIO 7420", "Wyse 5070 Thin Client", "Wyse 5470 All-in-One Thin Client", "Wyse 5470 Mobile Thin Client" ], "product": "Wyse Proprietary OS (Modern ThinOS)", "vendor": "Dell", "versions": [ { "lessThan": "ThinOS 2502", "status": "affected", "version": "N/A", "versionType": "semver" } ] } ], "datePublic": "2025-03-04T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Dell ThinOS 2411 and prior, contains an Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027) vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary code execution.\u003cbr\u003e" } ], "value": "Dell ThinOS 2411 and prior, contains an Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027) vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary code execution." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77: Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-07T08:06:12.680Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000289886/dsa-2025-107" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2025-26331", "datePublished": "2025-03-07T08:06:12.680Z", "dateReserved": "2025-02-07T06:04:04.738Z", "dateUpdated": "2025-03-11T03:55:16.832Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }