fkie_cve-2025-27688
Vulnerability from fkie_nvd
Published
2025-03-18 16:15
Modified
2025-07-01 15:08
Severity ?
Summary
Dell ThinOS 2408 and prior, contains an improper permissions vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.
References
▶ | URL | Tags | |
---|---|---|---|
security_alert@emc.com | https://www.dell.com/support/kbdoc/en-us/000289886/dsa-2025-107 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:thinos:*:*:*:*:*:*:*:*", "matchCriteriaId": "4548306E-F9EB-401E-A5F2-628BC422897E", "versionEndIncluding": "2408", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:latitude_3420:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FB6E60F-F100-42BF-BC38-A38620EF8D2C", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:latitude_3440:-:*:*:*:*:*:*:*", "matchCriteriaId": "31C78A9B-65B4-4213-9A96-4E57CFA5B195", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:latitude_5440:-:*:*:*:*:*:*:*", "matchCriteriaId": "84EC8EA3-A91D-4D3B-B1A5-D650A526CAAE", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:latitude_5450:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DAF60D4-BDA2-43ED-802D-CE3ACB548693", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:optiplex_3000_thin_client:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C4B0B6B-7740-46D0-9FE0-3AFF8D9B4DDA", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:optiplex_5400_all-in-one:-:*:*:*:*:*:*:*", "matchCriteriaId": "D08E685B-A29C-482E-989C-083B83E7C5CE", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:optiplex_7410_all-in-one:-:*:*:*:*:*:*:*", "matchCriteriaId": "802CD46E-86A4-4C9A-92DF-3297950D64B3", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:optiplex_7420_all-in-one:-:*:*:*:*:*:*:*", "matchCriteriaId": "E03807D5-B923-4CA3-A53E-C616846C9C6B", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:wyse_5070_thin_client:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1664E2E-057D-4A8F-B8FC-73EC25D48DBC", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:wyse_5470_all-in-one_thin_client:-:*:*:*:*:*:*:*", "matchCriteriaId": "3929B7A4-D181-4258-8722-57A751DB4CCC", "vulnerable": false }, { "criteria": "cpe:2.3:h:dell:wyse_5470_mobile_thin_client:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D9B6263-FF2F-428D-971B-48029951E62B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dell ThinOS 2408 and prior, contains an improper permissions vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges." }, { "lang": "es", "value": "Dell ThinOS 2408 y versiones anteriores presentan una vulnerabilidad de permisos inadecuados. Un atacante con pocos privilegios y acceso local podr\u00eda explotar esta vulnerabilidad, lo que conllevar\u00eda una elevaci\u00f3n de privilegios." } ], "id": "CVE-2025-27688", "lastModified": "2025-07-01T15:08:57.517", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "security_alert@emc.com", "type": "Secondary" } ] }, "published": "2025-03-18T16:15:27.980", "references": [ { "source": "security_alert@emc.com", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000289886/dsa-2025-107" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-732" } ], "source": "security_alert@emc.com", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…