Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
Some article numbers may have changed. If this isn't what you're looking for, try searching all articles. Search articles

DSA-2022-298: Dell Command | Update, Dell Update, and Alienware Update Security Update for Multiple Vulnerabilities

Summary: Dell Command | Update, Dell Update, and Alienware Update remediation is available for multiple vulnerabilities that may be exploited by malicious users to compromise the affected system. ...

This article applies to This article does not apply to This article is not tied to any specific product. Not all product versions are identified in this article.

Impact

High

Details

Proprietary Code CVEs Description CVSS Base Score CVSS Vector String
CVE-2022-34459 Dell Command | Update, Dell Update, and Alienware Update versions before 4.7 contain an Improper Verification of Cryptographic Signature vulnerability. A local malicious user could potentially exploit this vulnerability leading to malicious payload execution. 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-34458 Dell Command | Update, Dell Update, and Alienware Update versions before 4.7 contain an Exposure of Sensitive System Information to an unauthorized user vulnerability. A local malicious user could potentially exploit this vulnerability leading to the disclosure of confidential data. 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L
Proprietary Code CVEs Description CVSS Base Score CVSS Vector String
CVE-2022-34459 Dell Command | Update, Dell Update, and Alienware Update versions before 4.7 contain an Improper Verification of Cryptographic Signature vulnerability. A local malicious user could potentially exploit this vulnerability leading to malicious payload execution. 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-34458 Dell Command | Update, Dell Update, and Alienware Update versions before 4.7 contain an Exposure of Sensitive System Information to an unauthorized user vulnerability. A local malicious user could potentially exploit this vulnerability leading to the disclosure of confidential data. 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L
Dell Technologies recommends all customers consider both the CVSS base score and any relevant temporal and environmental scores that may impact the potential severity associated with a particular security vulnerability.

Affected Products & Remediation

Product Affected Versions Updated Versions Link to Update
Dell Command | Update
 
Versions before 4.7.1
 
4.7.1
 
Universal Windows Platform version for Windows 10 32-bit and 64-bit

Dell Command | Update Application for Windows 10 | Driver Details | Dell US
Dell Update /
Alienware Update
Versions before 4.7.1
 
4.7.1
 
Universal Windows Platform version for Windows 10 32-bit and 64-bit
Dell Update/Alienware Update Application for Windows 10 | Driver Details | Dell US
Product Affected Versions Updated Versions Link to Update
Dell Command | Update
 
Versions before 4.7.1
 
4.7.1
 
Universal Windows Platform version for Windows 10 32-bit and 64-bit

Dell Command | Update Application for Windows 10 | Driver Details | Dell US
Dell Update /
Alienware Update
Versions before 4.7.1
 
4.7.1
 
Universal Windows Platform version for Windows 10 32-bit and 64-bit
Dell Update/Alienware Update Application for Windows 10 | Driver Details | Dell US

Revision History

RevisionDateDescription
1.02022-11-14Initial Release
20.2022-12-08Updated Affected Products and Remediation section: Affected Version, Updated Version, and Link to Update

Acknowledgements

CVE-2022-34458: Dell would like to thank Alexander Pudwill for reporting this issue.

Related Information

Affected Products

Alienware, Dell Command | Update, Dell Update, Product Security Information
Article Properties
Article Number: 000204950
Article Type: Dell Security Advisory
Last Modified: 12 Dec 2022
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.