CVE Vulnerabilities

CVE-2023-28071

Insecure Operation on Windows Junction / Mount Point

Published: Jun 23, 2023 | Modified: Nov 21, 2024
CVSS 3.x
7.1
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

Dell Command | Update, Dell Update, and Alienware Update versions 4.9.0, A01 and prior contain an Insecure Operation on Windows Junction / Mount Point vulnerability. A local malicious user could potentially exploit this vulnerability to create arbitrary folder leading to permanent Denial of Service (DOS).

Weakness

The product opens a file or directory, but it does not properly prevent the name from being associated with a junction or mount point to a destination that is outside of the intended control sphere.

Affected Software

Name Vendor Start Version End Version
Alienware_update Dell * 4.9.0 (excluding)
Alienware_update Dell 4.9.0-a01 (including) 4.9.0-a01 (including)
Command_update Dell * 4.9.0 (excluding)
Command_update Dell 4.9.0-a01 (including) 4.9.0-a01 (including)
Update Dell * 4.9.0 (excluding)
Update Dell 4.9.0-a01 (including) 4.9.0-a01 (including)

Extended Description

Depending on the intended action being performed, this could allow an attacker to cause the product to read, write, delete, or otherwise operate on unauthorized files. In Windows, NTFS5 allows for file system objects called reparse points. Applications can create a hard link from one directory to another directory, called a junction point. They can also create a mapping from a directory to a drive letter, called a mount point. If a file is used by a privileged program, but it can be replaced with a hard link to a sensitive file (e.g., AUTOEXEC.BAT), an attacker could excalate privileges. When the process opens the file, the attacker can assume the privileges of that process, tricking the privileged process to read, modify, or delete the sensitive file, preventing the program from accurately processing data. Note that one can also point to registries and semaphores.

Potential Mitigations

References