{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T22:56:32.779","vulnerabilities":[{"cve":{"id":"CVE-2024-52535","sourceIdentifier":"security_alert@emc.com","published":"2024-12-25T15:15:07.247","lastModified":"2025-01-29T20:37:43.070","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Dell SupportAssist for Home PCs versions 4.6.1 and prior and Dell SupportAssist for Business PCs versions 4.5.0 and prior, contain a symbolic link (symlink) attack vulnerability in the software remediation component. A low-privileged authenticated user could potentially exploit this vulnerability, gaining privileges escalation, leading to arbitrary deletion of files and folders from the system."},{"lang":"es","value":"Dell SupportAssist para PC domésticas versiones 4.6.1 y anteriores y Dell SupportAssist para PC empresariales versiones 4.5.0 y anteriores contienen una vulnerabilidad de ataque de enlace simbólico en el componente de corrección de software. Un usuario autenticado con poco nivel de privilegios podría explotar esta vulnerabilidad, obteniendo un aumento de privilegios, lo que llevaría a la eliminación arbitraria de archivos y carpetas del sistema."}],"metrics":{"cvssMetricV31":[{"source":"security_alert@emc.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H","baseScore":7.1,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.2},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"security_alert@emc.com","type":"Secondary","description":[{"lang":"en","value":"CWE-61"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-59"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:dell:supportassist_for_business_pcs:*:*:*:*:*:*:*:*","versionEndExcluding":"4.5.1","matchCriteriaId":"76C15321-4D2E-4B1F-A9D7-FF21A575037E"},{"vulnerable":true,"criteria":"cpe:2.3:a:dell:supportassist_for_home_pcs:*:*:*:*:*:*:*:*","versionEndExcluding":"4.6.2","matchCriteriaId":"E6769560-3525-425A-AA70-BB7DE74B0840"}]}]}],"references":[{"url":"https://www.dell.com/support/kbdoc/en-us/000261086/dsa-2024-470-security-update-for-dell-supportassist-for-home-pcs-and-dell-supportassist-for-business-pcs-vulnerabilities","source":"security_alert@emc.com","tags":["Vendor Advisory"]}]}}]}