Search criteria
27 vulnerabilities found for ThinOS by Dell
CVE-2025-43882 (GCVE-0-2025-43882)
Vulnerability from nvd – Published: 2025-08-27 13:51 – Updated: 2025-08-28 03:55
VLAI?
Summary
Dell ThinOS 10, versions prior to 2508_10.0127, contains an Unverified Ownership vulnerability. A local low-privileged attacker could potentially exploit this vulnerability leading to Unauthorized Access.
Severity ?
7.8 (High)
CWE
- CWE-283 - Unverified Ownership
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Credits
Dell Technologies would like to thank Brandon Schreiber for reporting this vulnerability.
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-43882",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-27T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-28T03:55:23.169Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "ThinOS 10",
"vendor": "Dell",
"versions": [
{
"lessThan": "2508_10.0127",
"status": "affected",
"version": "N/A",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Dell Technologies would like to thank Brandon Schreiber for reporting this vulnerability."
}
],
"datePublic": "2025-08-26T17:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dell ThinOS 10, versions prior to 2508_10.0127, contains an Unverified Ownership vulnerability. A local low-privileged attacker could potentially exploit this vulnerability leading to Unauthorized Access."
}
],
"value": "Dell ThinOS 10, versions prior to 2508_10.0127, contains an Unverified Ownership vulnerability. A local low-privileged attacker could potentially exploit this vulnerability leading to Unauthorized Access."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-283",
"description": "CWE-283: Unverified Ownership",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-27T13:51:40.130Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000359619/dsa-2025-331"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2025-43882",
"datePublished": "2025-08-27T13:51:40.130Z",
"dateReserved": "2025-04-18T05:05:05.740Z",
"dateUpdated": "2025-08-28T03:55:23.169Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-43730 (GCVE-0-2025-43730)
Vulnerability from nvd – Published: 2025-08-27 13:57 – Updated: 2025-08-28 03:55
VLAI?
Summary
Dell ThinOS 10, versions prior to 2508_10.0127, contains an Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability. A local unauthenticated user could potentially exploit this vulnerability leading to Elevation of Privileges and Information disclosure.
Severity ?
8.4 (High)
CWE
- CWE-88 - Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-43730",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-27T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-28T03:55:24.667Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "ThinOS 10",
"vendor": "Dell",
"versions": [
{
"lessThan": "2508_10.0127",
"status": "affected",
"version": "N/A",
"versionType": "semver"
}
]
}
],
"datePublic": "2025-08-26T17:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dell ThinOS 10, versions prior to 2508_10.0127, contains an Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027) vulnerability. A local unauthenticated user could potentially exploit this vulnerability leading to Elevation of Privileges and Information disclosure."
}
],
"value": "Dell ThinOS 10, versions prior to 2508_10.0127, contains an Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027) vulnerability. A local unauthenticated user could potentially exploit this vulnerability leading to Elevation of Privileges and Information disclosure."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-88",
"description": "CWE-88: Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-27T13:57:39.797Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000359619/dsa-2025-331"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2025-43730",
"datePublished": "2025-08-27T13:57:39.797Z",
"dateReserved": "2025-04-17T05:03:55.667Z",
"dateUpdated": "2025-08-28T03:55:24.667Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-43729 (GCVE-0-2025-43729)
Vulnerability from nvd – Published: 2025-08-27 14:02 – Updated: 2025-08-28 03:55
VLAI?
Summary
Dell ThinOS 10, versions prior to 2508_10.0127, contains an Incorrect Permission Assignment for Critical Resource vulnerability. A local low-privileged attacker could potentially exploit this vulnerability leading to Elevation of Privileges and Unauthorized Access.
Severity ?
7.8 (High)
CWE
- CWE-732 - Incorrect Permission Assignment for Critical Resource
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-43729",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-27T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-28T03:55:25.732Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "ThinOS 10",
"vendor": "Dell",
"versions": [
{
"lessThan": "2508_10.0127",
"status": "affected",
"version": "N/A",
"versionType": "semver"
}
]
}
],
"datePublic": "2025-08-26T17:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dell ThinOS 10, versions prior to 2508_10.0127, contains an Incorrect Permission Assignment for Critical Resource vulnerability. A local low-privileged attacker could potentially exploit this vulnerability leading to Elevation of Privileges and Unauthorized Access."
}
],
"value": "Dell ThinOS 10, versions prior to 2508_10.0127, contains an Incorrect Permission Assignment for Critical Resource vulnerability. A local low-privileged attacker could potentially exploit this vulnerability leading to Elevation of Privileges and Unauthorized Access."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-732",
"description": "CWE-732: Incorrect Permission Assignment for Critical Resource",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-27T14:02:47.196Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000359619/dsa-2025-331"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2025-43729",
"datePublished": "2025-08-27T14:02:47.196Z",
"dateReserved": "2025-04-17T05:03:55.667Z",
"dateUpdated": "2025-08-28T03:55:25.732Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-43728 (GCVE-0-2025-43728)
Vulnerability from nvd – Published: 2025-08-27 13:44 – Updated: 2025-08-28 03:55
VLAI?
Summary
Dell ThinOS 10, versions prior to 2508_10.0127, contain a Protection Mechanism Failure vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Protection mechanism bypass.
Severity ?
9.6 (Critical)
CWE
- CWE-693 - Protection Mechanism Failure
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-43728",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-27T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-28T03:55:21.730Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "ThinOS 10",
"vendor": "Dell",
"versions": [
{
"lessThan": "2508_10.0127",
"status": "affected",
"version": "N/A",
"versionType": "semver"
}
]
}
],
"datePublic": "2025-08-26T17:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dell ThinOS 10, versions prior to 2508_10.0127, contain a Protection Mechanism Failure vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Protection mechanism bypass."
}
],
"value": "Dell ThinOS 10, versions prior to 2508_10.0127, contain a Protection Mechanism Failure vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Protection mechanism bypass."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-693",
"description": "CWE-693: Protection Mechanism Failure",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-27T13:44:25.996Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000359619/dsa-2025-331"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2025-43728",
"datePublished": "2025-08-27T13:44:25.996Z",
"dateReserved": "2025-04-17T05:03:55.667Z",
"dateUpdated": "2025-08-28T03:55:21.730Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-32752 (GCVE-0-2025-32752)
Vulnerability from nvd – Published: 2025-05-29 18:53 – Updated: 2025-06-12 16:34
VLAI?
Summary
Dell ThinOS 2502 and prior contain a Cleartext Storage of Sensitive Information vulnerability. A high privileged attacker with physical access could potentially exploit this vulnerability, leading to Information Disclosure.
Severity ?
5.7 (Medium)
CWE
- CWE-312 - Cleartext Storage of Sensitive Information
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Credits
Dell Technologies would like to thank Darren McDonald at AmberWolf for reporting this issue.
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-32752",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-05-29T19:05:53.778564Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-05-29T19:06:30.703Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "ThinOS",
"vendor": "Dell",
"versions": [
{
"lessThan": "2505",
"status": "affected",
"version": "N/A",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Dell Technologies would like to thank Darren McDonald at AmberWolf for reporting this issue."
}
],
"datePublic": "2025-05-29T17:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dell ThinOS 2502 and prior contain a Cleartext Storage of Sensitive Information vulnerability. A high privileged attacker with physical access could potentially exploit this vulnerability, leading to Information Disclosure.\u003cbr\u003e"
}
],
"value": "Dell ThinOS 2502 and prior contain a Cleartext Storage of Sensitive Information vulnerability. A high privileged attacker with physical access could potentially exploit this vulnerability, leading to Information Disclosure."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "LOW",
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-312",
"description": "CWE-312: Cleartext Storage of Sensitive Information",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-06-12T16:34:16.735Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000325632/dsa-2025-225"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2025-32752",
"datePublished": "2025-05-29T18:53:52.910Z",
"dateReserved": "2025-04-10T05:03:51.740Z",
"dateUpdated": "2025-06-12T16:34:16.735Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-27688 (GCVE-0-2025-27688)
Vulnerability from nvd – Published: 2025-03-18 15:55 – Updated: 2025-03-19 03:55
VLAI?
Summary
Dell ThinOS 2408 and prior, contains an improper permissions vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.
Severity ?
7.8 (High)
CWE
- CWE-732 - Incorrect Permission Assignment for Critical Resource
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dell | Wyse Proprietary OS (Modern ThinOS) |
Affected:
N/A , < ThinOS 2502
(semver)
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-27688",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-18T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-19T03:55:50.783Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Wyse Proprietary OS (Modern ThinOS)",
"vendor": "Dell",
"versions": [
{
"lessThan": "ThinOS 2502",
"status": "affected",
"version": "N/A",
"versionType": "semver"
}
]
}
],
"datePublic": "2025-03-18T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dell ThinOS 2408 and prior, contains an improper permissions vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.\u003cbr\u003e"
}
],
"value": "Dell ThinOS 2408 and prior, contains an improper permissions vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-732",
"description": "CWE-732: Incorrect Permission Assignment for Critical Resource",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-18T15:55:44.470Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000289886/dsa-2025-107"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2025-27688",
"datePublished": "2025-03-18T15:55:44.470Z",
"dateReserved": "2025-03-05T07:33:28.315Z",
"dateUpdated": "2025-03-19T03:55:50.783Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-26331 (GCVE-0-2025-26331)
Vulnerability from nvd – Published: 2025-03-07 08:06 – Updated: 2025-03-11 03:55
VLAI?
Summary
Dell ThinOS 2411 and prior, contains an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary code execution.
Severity ?
7.8 (High)
CWE
- CWE-77 - Improper Neutralization of Special Elements used in a Command ('Command Injection')
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dell | Wyse Proprietary OS (Modern ThinOS) |
Affected:
N/A , < ThinOS 2502
(semver)
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-26331",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-10T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-11T03:55:16.832Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"third-party-advisory"
],
"url": "https://www.incibe.es/incibe-cert/alerta-temprana/vulnerabilidades/cve-2025-26331"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"modules": [
"ThinOS",
"Latitude 3420",
"Latitude 3440",
"Latitude 5440",
"Latitude 5450",
"OptiPlex 3000 Thin Client",
"OptiPlex 5400 All-in-One",
"OptiPlex AIO 7410",
"OptiPlex AIO 7420",
"Wyse 5070 Thin Client",
"Wyse 5470 All-in-One Thin Client",
"Wyse 5470 Mobile Thin Client"
],
"product": "Wyse Proprietary OS (Modern ThinOS)",
"vendor": "Dell",
"versions": [
{
"lessThan": "ThinOS 2502",
"status": "affected",
"version": "N/A",
"versionType": "semver"
}
]
}
],
"datePublic": "2025-03-04T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dell ThinOS 2411 and prior, contains an Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027) vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary code execution.\u003cbr\u003e"
}
],
"value": "Dell ThinOS 2411 and prior, contains an Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027) vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary code execution."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-77",
"description": "CWE-77: Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-07T08:06:12.680Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000289886/dsa-2025-107"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2025-26331",
"datePublished": "2025-03-07T08:06:12.680Z",
"dateReserved": "2025-02-07T06:04:04.738Z",
"dateUpdated": "2025-03-11T03:55:16.832Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-53289 (GCVE-0-2024-53289)
Vulnerability from nvd – Published: 2024-12-11 07:40 – Updated: 2024-12-11 15:08
VLAI?
Summary
Dell ThinOS version 2408 contains a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.
Severity ?
7.8 (High)
CWE
- CWE-367 - Time-of-check Time-of-use (TOCTOU) Race Condition
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dell | Wyse Proprietary OS (Modern ThinOS) |
Affected:
ThinOS 2408
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-53289",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-12-11T15:07:07.575760Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-12-11T15:08:48.831Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Wyse Proprietary OS (Modern ThinOS)",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "ThinOS 2408"
}
]
}
],
"datePublic": "2024-12-02T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dell ThinOS version 2408 contains a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges."
}
],
"value": "Dell ThinOS version 2408 contains a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-367",
"description": "CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-11T07:40:46.895Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000248475/dsa-2024-463"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2024-53289",
"datePublished": "2024-12-11T07:40:46.895Z",
"dateReserved": "2024-11-20T06:05:04.566Z",
"dateUpdated": "2024-12-11T15:08:48.831Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-53290 (GCVE-0-2024-53290)
Vulnerability from nvd – Published: 2024-12-11 07:34 – Updated: 2024-12-11 15:06
VLAI?
Summary
Dell ThinOS version 2408 contains an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability, leading to Command execution
Severity ?
8.4 (High)
CWE
- CWE-77 - Improper Neutralization of Special Elements used in a Command ('Command Injection')
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dell | Wyse Proprietary OS (Modern ThinOS) |
Affected:
ThinOS 2408
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-53290",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-12-11T15:06:31.131210Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-12-11T15:06:53.223Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Wyse Proprietary OS (Modern ThinOS)",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "ThinOS 2408"
}
]
}
],
"datePublic": "2024-12-02T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dell ThinOS version 2408 contains an Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027) vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability, leading to Command execution"
}
],
"value": "Dell ThinOS version 2408 contains an Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027) vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability, leading to Command execution"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-77",
"description": "CWE-77: Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-11T07:34:47.345Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000248475/dsa-2024-463"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2024-53290",
"datePublished": "2024-12-11T07:34:47.345Z",
"dateReserved": "2024-11-20T06:05:04.566Z",
"dateUpdated": "2024-12-11T15:06:53.223Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
FKIE_CVE-2025-43730
Vulnerability from fkie_nvd - Published: 2025-08-27 14:15 - Updated: 2026-01-15 14:59
Severity ?
8.4 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Dell ThinOS 10, versions prior to 2508_10.0127, contains an Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability. A local unauthenticated user could potentially exploit this vulnerability leading to Elevation of Privileges and Information disclosure.
References
| URL | Tags | ||
|---|---|---|---|
| security_alert@emc.com | https://www.dell.com/support/kbdoc/en-us/000359619/dsa-2025-331 | Vendor Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:thinos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D06C2C8B-6EBA-4C1C-8D6B-BB92F3BFCD95",
"versionEndExcluding": "2508",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_3330:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52B5397C-6646-4EF5-894A-156AB6704295",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:latitude_3420:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FB6E60F-F100-42BF-BC38-A38620EF8D2C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:latitude_3440:-:*:*:*:*:*:*:*",
"matchCriteriaId": "31C78A9B-65B4-4213-9A96-4E57CFA5B195",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:latitude_3450:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C087B85D-2F09-49E5-8BE9-DE724B7D5BFB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:latitude_5440:-:*:*:*:*:*:*:*",
"matchCriteriaId": "84EC8EA3-A91D-4D3B-B1A5-D650A526CAAE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:latitude_5450:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3DAF60D4-BDA2-43ED-802D-CE3ACB548693",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:latitude_5520:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2AC36F7-FC4B-4CA4-91F3-8337C8F34681",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:latitude_5530:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EB8E326-0B12-4889-A7D2-AFFEAFBAD6AF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:latitude_5540:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2B13569-D3F7-4847-B2BE-6BC414F8FC52",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:latitude_5550:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1FD13310-CCC0-490C-A959-42EF8EC41232",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:optiplex_3000_tc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8FA3CCBF-5DA1-4561-A933-FA24E71E683A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:optiplex_5400_all-in-one:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D08E685B-A29C-482E-989C-083B83E7C5CE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:optiplex_7020:-:*:*:*:*:*:*:*",
"matchCriteriaId": "84533BD1-3A0B-463D-A3CB-0B3DE816235E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:optiplex_all-in-one_7410:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B59560F-34A6-4B29-94B7-D04CDBA61A84",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:optiplex_all-in-one_7420:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BCF051C7-F440-449B-81BC-761D6681834D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:optiplex_micro_plus_7010:-:*:*:*:*:*:*:*",
"matchCriteriaId": "81EBA40C-36F9-4790-9369-6DEDCBB1EB26",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:precision_3260_compact:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63A76C54-765B-4B50-AACB-E1AE80666325",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:precision_3280:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E7DFA74C-83F0-4E7D-95DF-821D9F5E265E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:pro_14_pc14250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4301C860-38AC-402A-85D8-7C7401DCD4AB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:pro_16_pc16250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6331156-5254-4485-B893-98066F6AC081",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:pro_16_plus_pb16250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "607B9989-E5E9-48D7-B4DD-5EE6C28A89F2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:pro_24_all-in-one:-:*:*:*:*:*:*:*",
"matchCriteriaId": "70A7C423-66F8-4C30-9CBC-60402B0FE604",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:pro_max_14:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0568C3D3-1E10-4612-B4F1-C2958908004B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:pro_max_16_plus:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8C0A51D1-E96D-470F-A13A-C3FE6BBF4D01",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:pro_rugged_13_ra13250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "291A5F5C-D7B1-4745-A885-E7C5136D5302",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:pro_rugged_14_rb14250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04BC32D4-43B9-4243-9762-905D4C332AD6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:pro_slim_low_sff:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ABBEAB89-7C14-4578-8DB8-7D208CE0AAD5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:pro_tower_qct1250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "808A8143-DE7B-45BA-BDCA-203CFD0B4279",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:wyse_5070_extended_thin_client:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52E907D0-84D2-46F4-A325-3E26347CBDAC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:wyse_5070_thin_client:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C1664E2E-057D-4A8F-B8FC-73EC25D48DBC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:wyse_5470_all-in-one_thin_client:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3929B7A4-D181-4258-8722-57A751DB4CCC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:wyse_5470_mtc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6819DA6E-39DD-4D5A-B4A3-A3816F7A2343",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell ThinOS 10, versions prior to 2508_10.0127, contains an Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027) vulnerability. A local unauthenticated user could potentially exploit this vulnerability leading to Elevation of Privileges and Information disclosure."
},
{
"lang": "es",
"value": "Dell ThinOS 10, versiones anteriores a la 2508_10.0127, contiene una vulnerabilidad de neutralizaci\u00f3n incorrecta de delimitadores de argumentos en un comando (inyecci\u00f3n de argumentos). Un usuario local no autenticado podr\u00eda explotar esta vulnerabilidad, lo que podr\u00eda provocar la elevaci\u00f3n de privilegios y la divulgaci\u00f3n de informaci\u00f3n."
}
],
"id": "CVE-2025-43730",
"lastModified": "2026-01-15T14:59:32.390",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9,
"source": "security_alert@emc.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2025-08-27T14:15:51.120",
"references": [
{
"source": "security_alert@emc.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000359619/dsa-2025-331"
}
],
"sourceIdentifier": "security_alert@emc.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-88"
}
],
"source": "security_alert@emc.com",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-43882
Vulnerability from fkie_nvd - Published: 2025-08-27 14:15 - Updated: 2026-01-15 14:58
Severity ?
Summary
Dell ThinOS 10, versions prior to 2508_10.0127, contains an Unverified Ownership vulnerability. A local low-privileged attacker could potentially exploit this vulnerability leading to Unauthorized Access.
References
| URL | Tags | ||
|---|---|---|---|
| security_alert@emc.com | https://www.dell.com/support/kbdoc/en-us/000359619/dsa-2025-331 | Vendor Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:thinos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D06C2C8B-6EBA-4C1C-8D6B-BB92F3BFCD95",
"versionEndExcluding": "2508",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_3330:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52B5397C-6646-4EF5-894A-156AB6704295",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:latitude_3420:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FB6E60F-F100-42BF-BC38-A38620EF8D2C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:latitude_3440:-:*:*:*:*:*:*:*",
"matchCriteriaId": "31C78A9B-65B4-4213-9A96-4E57CFA5B195",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:latitude_3450:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C087B85D-2F09-49E5-8BE9-DE724B7D5BFB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:latitude_5440:-:*:*:*:*:*:*:*",
"matchCriteriaId": "84EC8EA3-A91D-4D3B-B1A5-D650A526CAAE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:latitude_5450:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3DAF60D4-BDA2-43ED-802D-CE3ACB548693",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:latitude_5520:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2AC36F7-FC4B-4CA4-91F3-8337C8F34681",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:latitude_5530:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EB8E326-0B12-4889-A7D2-AFFEAFBAD6AF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:latitude_5540:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2B13569-D3F7-4847-B2BE-6BC414F8FC52",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:latitude_5550:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1FD13310-CCC0-490C-A959-42EF8EC41232",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:optiplex_3000_tc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8FA3CCBF-5DA1-4561-A933-FA24E71E683A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:optiplex_5400_all-in-one:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D08E685B-A29C-482E-989C-083B83E7C5CE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:optiplex_7020:-:*:*:*:*:*:*:*",
"matchCriteriaId": "84533BD1-3A0B-463D-A3CB-0B3DE816235E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:optiplex_all-in-one_7410:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B59560F-34A6-4B29-94B7-D04CDBA61A84",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:optiplex_all-in-one_7420:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BCF051C7-F440-449B-81BC-761D6681834D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:optiplex_micro_plus_7010:-:*:*:*:*:*:*:*",
"matchCriteriaId": "81EBA40C-36F9-4790-9369-6DEDCBB1EB26",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:precision_3260_compact:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63A76C54-765B-4B50-AACB-E1AE80666325",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:precision_3280:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E7DFA74C-83F0-4E7D-95DF-821D9F5E265E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:pro_14_pc14250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4301C860-38AC-402A-85D8-7C7401DCD4AB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:pro_16_pc16250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6331156-5254-4485-B893-98066F6AC081",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:pro_16_plus_pb16250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "607B9989-E5E9-48D7-B4DD-5EE6C28A89F2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:pro_24_all-in-one:-:*:*:*:*:*:*:*",
"matchCriteriaId": "70A7C423-66F8-4C30-9CBC-60402B0FE604",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:pro_max_14:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0568C3D3-1E10-4612-B4F1-C2958908004B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:pro_max_16_plus:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8C0A51D1-E96D-470F-A13A-C3FE6BBF4D01",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:pro_rugged_13_ra13250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "291A5F5C-D7B1-4745-A885-E7C5136D5302",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:pro_rugged_14_rb14250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04BC32D4-43B9-4243-9762-905D4C332AD6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:pro_slim_low_sff:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ABBEAB89-7C14-4578-8DB8-7D208CE0AAD5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:pro_tower_qct1250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "808A8143-DE7B-45BA-BDCA-203CFD0B4279",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:wyse_5070_extended_thin_client:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52E907D0-84D2-46F4-A325-3E26347CBDAC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:wyse_5070_thin_client:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C1664E2E-057D-4A8F-B8FC-73EC25D48DBC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:wyse_5470_all-in-one_thin_client:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3929B7A4-D181-4258-8722-57A751DB4CCC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:wyse_5470_mtc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6819DA6E-39DD-4D5A-B4A3-A3816F7A2343",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell ThinOS 10, versions prior to 2508_10.0127, contains an Unverified Ownership vulnerability. A local low-privileged attacker could potentially exploit this vulnerability leading to Unauthorized Access."
},
{
"lang": "es",
"value": "Dell ThinOS 10, versiones anteriores a la 2508_10.0127, contiene una vulnerabilidad de propiedad no verificada. Un atacante local con pocos privilegios podr\u00eda explotar esta vulnerabilidad y provocar acceso no autorizado."
}
],
"id": "CVE-2025-43882",
"lastModified": "2026-01-15T14:58:06.550",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "security_alert@emc.com",
"type": "Secondary"
}
]
},
"published": "2025-08-27T14:15:51.320",
"references": [
{
"source": "security_alert@emc.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000359619/dsa-2025-331"
}
],
"sourceIdentifier": "security_alert@emc.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-283"
}
],
"source": "security_alert@emc.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2025-43729
Vulnerability from fkie_nvd - Published: 2025-08-27 14:15 - Updated: 2026-01-15 15:11
Severity ?
Summary
Dell ThinOS 10, versions prior to 2508_10.0127, contains an Incorrect Permission Assignment for Critical Resource vulnerability. A local low-privileged attacker could potentially exploit this vulnerability leading to Elevation of Privileges and Unauthorized Access.
References
| URL | Tags | ||
|---|---|---|---|
| security_alert@emc.com | https://www.dell.com/support/kbdoc/en-us/000359619/dsa-2025-331 | Vendor Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:thinos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D06C2C8B-6EBA-4C1C-8D6B-BB92F3BFCD95",
"versionEndExcluding": "2508",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_3330:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52B5397C-6646-4EF5-894A-156AB6704295",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:latitude_3420:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FB6E60F-F100-42BF-BC38-A38620EF8D2C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:latitude_3440:-:*:*:*:*:*:*:*",
"matchCriteriaId": "31C78A9B-65B4-4213-9A96-4E57CFA5B195",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:latitude_3450:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C087B85D-2F09-49E5-8BE9-DE724B7D5BFB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:latitude_5440:-:*:*:*:*:*:*:*",
"matchCriteriaId": "84EC8EA3-A91D-4D3B-B1A5-D650A526CAAE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:latitude_5450:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3DAF60D4-BDA2-43ED-802D-CE3ACB548693",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:latitude_5520:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2AC36F7-FC4B-4CA4-91F3-8337C8F34681",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:latitude_5530:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EB8E326-0B12-4889-A7D2-AFFEAFBAD6AF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:latitude_5540:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2B13569-D3F7-4847-B2BE-6BC414F8FC52",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:latitude_5550:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1FD13310-CCC0-490C-A959-42EF8EC41232",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:optiplex_3000_tc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8FA3CCBF-5DA1-4561-A933-FA24E71E683A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:optiplex_5400_all-in-one:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D08E685B-A29C-482E-989C-083B83E7C5CE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:optiplex_7020:-:*:*:*:*:*:*:*",
"matchCriteriaId": "84533BD1-3A0B-463D-A3CB-0B3DE816235E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:optiplex_all-in-one_7410:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B59560F-34A6-4B29-94B7-D04CDBA61A84",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:optiplex_all-in-one_7420:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BCF051C7-F440-449B-81BC-761D6681834D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:optiplex_micro_plus_7010:-:*:*:*:*:*:*:*",
"matchCriteriaId": "81EBA40C-36F9-4790-9369-6DEDCBB1EB26",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:precision_3260_compact:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63A76C54-765B-4B50-AACB-E1AE80666325",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:precision_3280:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E7DFA74C-83F0-4E7D-95DF-821D9F5E265E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:pro_14_pc14250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4301C860-38AC-402A-85D8-7C7401DCD4AB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:pro_16_pc16250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6331156-5254-4485-B893-98066F6AC081",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:pro_16_plus_pb16250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "607B9989-E5E9-48D7-B4DD-5EE6C28A89F2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:pro_24_all-in-one:-:*:*:*:*:*:*:*",
"matchCriteriaId": "70A7C423-66F8-4C30-9CBC-60402B0FE604",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:pro_max_14:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0568C3D3-1E10-4612-B4F1-C2958908004B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:pro_max_16_plus:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8C0A51D1-E96D-470F-A13A-C3FE6BBF4D01",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:pro_rugged_13_ra13250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "291A5F5C-D7B1-4745-A885-E7C5136D5302",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:pro_rugged_14_rb14250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04BC32D4-43B9-4243-9762-905D4C332AD6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:pro_slim_low_sff:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ABBEAB89-7C14-4578-8DB8-7D208CE0AAD5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:pro_tower_qct1250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "808A8143-DE7B-45BA-BDCA-203CFD0B4279",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:wyse_5070_extended_thin_client:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52E907D0-84D2-46F4-A325-3E26347CBDAC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:wyse_5070_thin_client:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C1664E2E-057D-4A8F-B8FC-73EC25D48DBC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:wyse_5470_all-in-one_thin_client:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3929B7A4-D181-4258-8722-57A751DB4CCC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:wyse_5470_mtc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6819DA6E-39DD-4D5A-B4A3-A3816F7A2343",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell ThinOS 10, versions prior to 2508_10.0127, contains an Incorrect Permission Assignment for Critical Resource vulnerability. A local low-privileged attacker could potentially exploit this vulnerability leading to Elevation of Privileges and Unauthorized Access."
},
{
"lang": "es",
"value": "Dell ThinOS 10, versiones anteriores a la 2508_10.0127, contiene una vulnerabilidad de asignaci\u00f3n incorrecta de permisos para recursos cr\u00edticos. Un atacante local con pocos privilegios podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda una elevaci\u00f3n de privilegios y acceso no autorizado."
}
],
"id": "CVE-2025-43729",
"lastModified": "2026-01-15T15:11:08.060",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "security_alert@emc.com",
"type": "Secondary"
}
]
},
"published": "2025-08-27T14:15:50.937",
"references": [
{
"source": "security_alert@emc.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000359619/dsa-2025-331"
}
],
"sourceIdentifier": "security_alert@emc.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-732"
}
],
"source": "security_alert@emc.com",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-43728
Vulnerability from fkie_nvd - Published: 2025-08-27 14:15 - Updated: 2026-01-15 15:12
Severity ?
9.6 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Dell ThinOS 10, versions prior to 2508_10.0127, contain a Protection Mechanism Failure vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Protection mechanism bypass.
References
| URL | Tags | ||
|---|---|---|---|
| security_alert@emc.com | https://www.dell.com/support/kbdoc/en-us/000359619/dsa-2025-331 | Vendor Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:thinos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D06C2C8B-6EBA-4C1C-8D6B-BB92F3BFCD95",
"versionEndExcluding": "2508",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_3330:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52B5397C-6646-4EF5-894A-156AB6704295",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:latitude_3420:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FB6E60F-F100-42BF-BC38-A38620EF8D2C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:latitude_3440:-:*:*:*:*:*:*:*",
"matchCriteriaId": "31C78A9B-65B4-4213-9A96-4E57CFA5B195",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:latitude_3450:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C087B85D-2F09-49E5-8BE9-DE724B7D5BFB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:latitude_5440:-:*:*:*:*:*:*:*",
"matchCriteriaId": "84EC8EA3-A91D-4D3B-B1A5-D650A526CAAE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:latitude_5450:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3DAF60D4-BDA2-43ED-802D-CE3ACB548693",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:latitude_5520:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2AC36F7-FC4B-4CA4-91F3-8337C8F34681",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:latitude_5530:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EB8E326-0B12-4889-A7D2-AFFEAFBAD6AF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:latitude_5540:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2B13569-D3F7-4847-B2BE-6BC414F8FC52",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:latitude_5550:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1FD13310-CCC0-490C-A959-42EF8EC41232",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:optiplex_3000_tc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8FA3CCBF-5DA1-4561-A933-FA24E71E683A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:optiplex_5400_all-in-one:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D08E685B-A29C-482E-989C-083B83E7C5CE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:optiplex_7020:-:*:*:*:*:*:*:*",
"matchCriteriaId": "84533BD1-3A0B-463D-A3CB-0B3DE816235E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:optiplex_all-in-one_7410:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B59560F-34A6-4B29-94B7-D04CDBA61A84",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:optiplex_all-in-one_7420:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BCF051C7-F440-449B-81BC-761D6681834D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:optiplex_micro_plus_7010:-:*:*:*:*:*:*:*",
"matchCriteriaId": "81EBA40C-36F9-4790-9369-6DEDCBB1EB26",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:precision_3260_compact:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63A76C54-765B-4B50-AACB-E1AE80666325",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:precision_3280:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E7DFA74C-83F0-4E7D-95DF-821D9F5E265E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:pro_14_pc14250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4301C860-38AC-402A-85D8-7C7401DCD4AB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:pro_16_pc16250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6331156-5254-4485-B893-98066F6AC081",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:pro_16_plus_pb16250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "607B9989-E5E9-48D7-B4DD-5EE6C28A89F2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:pro_24_all-in-one:-:*:*:*:*:*:*:*",
"matchCriteriaId": "70A7C423-66F8-4C30-9CBC-60402B0FE604",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:pro_max_14:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0568C3D3-1E10-4612-B4F1-C2958908004B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:pro_max_16_plus:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8C0A51D1-E96D-470F-A13A-C3FE6BBF4D01",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:pro_rugged_13_ra13250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "291A5F5C-D7B1-4745-A885-E7C5136D5302",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:pro_rugged_14_rb14250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04BC32D4-43B9-4243-9762-905D4C332AD6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:pro_slim_low_sff:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ABBEAB89-7C14-4578-8DB8-7D208CE0AAD5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:pro_tower_qct1250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "808A8143-DE7B-45BA-BDCA-203CFD0B4279",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:wyse_5070_extended_thin_client:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52E907D0-84D2-46F4-A325-3E26347CBDAC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:wyse_5070_thin_client:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C1664E2E-057D-4A8F-B8FC-73EC25D48DBC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:wyse_5470_all-in-one_thin_client:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3929B7A4-D181-4258-8722-57A751DB4CCC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:wyse_5470_mtc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6819DA6E-39DD-4D5A-B4A3-A3816F7A2343",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell ThinOS 10, versions prior to 2508_10.0127, contain a Protection Mechanism Failure vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Protection mechanism bypass."
},
{
"lang": "es",
"value": "Dell ThinOS 10, versiones anteriores a la 2508_10.0127, contiene una vulnerabilidad de fallo del mecanismo de protecci\u00f3n. Un atacante no autenticado con acceso remoto podr\u00eda explotar esta vulnerabilidad, lo que provocar\u00eda la omisi\u00f3n del mecanismo de protecci\u00f3n."
}
],
"id": "CVE-2025-43728",
"lastModified": "2026-01-15T15:12:17.087",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0,
"source": "security_alert@emc.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2025-08-27T14:15:50.713",
"references": [
{
"source": "security_alert@emc.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000359619/dsa-2025-331"
}
],
"sourceIdentifier": "security_alert@emc.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-693"
}
],
"source": "security_alert@emc.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2025-32752
Vulnerability from fkie_nvd - Published: 2025-05-29 19:15 - Updated: 2025-06-24 17:54
Severity ?
5.7 (Medium) - CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
4.6 (Medium) - CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
4.6 (Medium) - CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
Dell ThinOS 2502 and prior contain a Cleartext Storage of Sensitive Information vulnerability. A high privileged attacker with physical access could potentially exploit this vulnerability, leading to Information Disclosure.
References
| URL | Tags | ||
|---|---|---|---|
| security_alert@emc.com | https://www.dell.com/support/kbdoc/en-us/000325632/dsa-2025-225 | Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:thinos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1CCC0EBC-025C-4F60-91A7-8DCD8FDE02F8",
"versionEndIncluding": "2502",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell ThinOS 2502 and prior contain a Cleartext Storage of Sensitive Information vulnerability. A high privileged attacker with physical access could potentially exploit this vulnerability, leading to Information Disclosure."
},
{
"lang": "es",
"value": "Dell ThinOS 2502 y versiones anteriores presentan una vulnerabilidad de almacenamiento de informaci\u00f3n confidencial en texto sin cifrar. Un atacante con privilegios elevados y acceso f\u00edsico podr\u00eda explotar esta vulnerabilidad, lo que podr\u00eda provocar una divulgaci\u00f3n de informaci\u00f3n."
}
],
"id": "CVE-2025-32752",
"lastModified": "2025-06-24T17:54:12.473",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "LOW",
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 0.9,
"impactScore": 4.7,
"source": "security_alert@emc.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 0.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2025-05-29T19:15:27.630",
"references": [
{
"source": "security_alert@emc.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000325632/dsa-2025-225"
}
],
"sourceIdentifier": "security_alert@emc.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-312"
}
],
"source": "security_alert@emc.com",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-27688
Vulnerability from fkie_nvd - Published: 2025-03-18 16:15 - Updated: 2025-07-01 15:08
Severity ?
Summary
Dell ThinOS 2408 and prior, contains an improper permissions vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.
References
| URL | Tags | ||
|---|---|---|---|
| security_alert@emc.com | https://www.dell.com/support/kbdoc/en-us/000289886/dsa-2025-107 | Vendor Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:thinos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4548306E-F9EB-401E-A5F2-628BC422897E",
"versionEndIncluding": "2408",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_3420:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FB6E60F-F100-42BF-BC38-A38620EF8D2C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:latitude_3440:-:*:*:*:*:*:*:*",
"matchCriteriaId": "31C78A9B-65B4-4213-9A96-4E57CFA5B195",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:latitude_5440:-:*:*:*:*:*:*:*",
"matchCriteriaId": "84EC8EA3-A91D-4D3B-B1A5-D650A526CAAE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:latitude_5450:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3DAF60D4-BDA2-43ED-802D-CE3ACB548693",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:optiplex_3000_thin_client:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1C4B0B6B-7740-46D0-9FE0-3AFF8D9B4DDA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:optiplex_5400_all-in-one:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D08E685B-A29C-482E-989C-083B83E7C5CE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:optiplex_7410_all-in-one:-:*:*:*:*:*:*:*",
"matchCriteriaId": "802CD46E-86A4-4C9A-92DF-3297950D64B3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:optiplex_7420_all-in-one:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E03807D5-B923-4CA3-A53E-C616846C9C6B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:wyse_5070_thin_client:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C1664E2E-057D-4A8F-B8FC-73EC25D48DBC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:wyse_5470_all-in-one_thin_client:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3929B7A4-D181-4258-8722-57A751DB4CCC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:wyse_5470_mobile_thin_client:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D9B6263-FF2F-428D-971B-48029951E62B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell ThinOS 2408 and prior, contains an improper permissions vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges."
},
{
"lang": "es",
"value": "Dell ThinOS 2408 y versiones anteriores presentan una vulnerabilidad de permisos inadecuados. Un atacante con pocos privilegios y acceso local podr\u00eda explotar esta vulnerabilidad, lo que conllevar\u00eda una elevaci\u00f3n de privilegios."
}
],
"id": "CVE-2025-27688",
"lastModified": "2025-07-01T15:08:57.517",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "security_alert@emc.com",
"type": "Secondary"
}
]
},
"published": "2025-03-18T16:15:27.980",
"references": [
{
"source": "security_alert@emc.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000289886/dsa-2025-107"
}
],
"sourceIdentifier": "security_alert@emc.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-732"
}
],
"source": "security_alert@emc.com",
"type": "Secondary"
}
]
}
FKIE_CVE-2025-26331
Vulnerability from fkie_nvd - Published: 2025-03-07 08:15 - Updated: 2025-07-01 15:08
Severity ?
Summary
Dell ThinOS 2411 and prior, contains an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary code execution.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:thinos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6424032C-A6D9-4048-A769-873DEAE35BFA",
"versionEndIncluding": "2411",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:dell:latitude_3420:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FB6E60F-F100-42BF-BC38-A38620EF8D2C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:latitude_3440:-:*:*:*:*:*:*:*",
"matchCriteriaId": "31C78A9B-65B4-4213-9A96-4E57CFA5B195",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:latitude_5440:-:*:*:*:*:*:*:*",
"matchCriteriaId": "84EC8EA3-A91D-4D3B-B1A5-D650A526CAAE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:latitude_5450:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3DAF60D4-BDA2-43ED-802D-CE3ACB548693",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:optiplex_3000_thin_client:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1C4B0B6B-7740-46D0-9FE0-3AFF8D9B4DDA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:optiplex_5400_all-in-one:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D08E685B-A29C-482E-989C-083B83E7C5CE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:optiplex_7410_all-in-one:-:*:*:*:*:*:*:*",
"matchCriteriaId": "802CD46E-86A4-4C9A-92DF-3297950D64B3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:optiplex_7420_all-in-one:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E03807D5-B923-4CA3-A53E-C616846C9C6B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:wyse_5070_thin_client:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C1664E2E-057D-4A8F-B8FC-73EC25D48DBC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:wyse_5470_all-in-one_thin_client:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3929B7A4-D181-4258-8722-57A751DB4CCC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:dell:wyse_5470_mobile_thin_client:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D9B6263-FF2F-428D-971B-48029951E62B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell ThinOS 2411 and prior, contains an Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027) vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary code execution."
},
{
"lang": "es",
"value": "Dell ThinOS 2411 y versiones anteriores contienen una vulnerabilidad de neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un comando (\u0027inyecci\u00f3n de comando\u0027). Un atacante con pocos privilegios y acceso local podr\u00eda aprovechar esta vulnerabilidad, lo que provocar\u00eda la ejecuci\u00f3n de c\u00f3digo arbitrario."
}
],
"id": "CVE-2025-26331",
"lastModified": "2025-07-01T15:08:21.283",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "security_alert@emc.com",
"type": "Secondary"
}
]
},
"published": "2025-03-07T08:15:43.040",
"references": [
{
"source": "security_alert@emc.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000289886/dsa-2025-107"
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Third Party Advisory"
],
"url": "https://www.incibe.es/incibe-cert/alerta-temprana/vulnerabilidades/cve-2025-26331"
}
],
"sourceIdentifier": "security_alert@emc.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-77"
}
],
"source": "security_alert@emc.com",
"type": "Secondary"
}
]
}
FKIE_CVE-2024-53290
Vulnerability from fkie_nvd - Published: 2024-12-11 08:15 - Updated: 2025-02-04 16:14
Severity ?
8.4 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.4 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.4 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Dell ThinOS version 2408 contains an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability, leading to Command execution
References
| URL | Tags | ||
|---|---|---|---|
| security_alert@emc.com | https://www.dell.com/support/kbdoc/en-us/000248475/dsa-2024-463 | Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:thinos:2408:*:*:*:*:*:*:*",
"matchCriteriaId": "8F71D748-6B04-4EB2-865C-63291F8A4226",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell ThinOS version 2408 contains an Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027) vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability, leading to Command execution"
},
{
"lang": "es",
"value": "La versi\u00f3n 2408 de Dell ThinOS contiene una vulnerabilidad de neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un comando (\u0027inyecci\u00f3n de comandos\u0027). Un atacante no autenticado con acceso local podr\u00eda aprovechar esta vulnerabilidad, lo que provocar\u00eda la ejecuci\u00f3n de un comando."
}
],
"id": "CVE-2024-53290",
"lastModified": "2025-02-04T16:14:05.260",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9,
"source": "security_alert@emc.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2024-12-11T08:15:06.250",
"references": [
{
"source": "security_alert@emc.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000248475/dsa-2024-463"
}
],
"sourceIdentifier": "security_alert@emc.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-77"
}
],
"source": "security_alert@emc.com",
"type": "Secondary"
}
]
}
FKIE_CVE-2024-53289
Vulnerability from fkie_nvd - Published: 2024-12-11 08:15 - Updated: 2025-02-04 16:13
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.0 (High) - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
7.0 (High) - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Dell ThinOS version 2408 contains a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.
References
| URL | Tags | ||
|---|---|---|---|
| security_alert@emc.com | https://www.dell.com/support/kbdoc/en-us/000248475/dsa-2024-463 | Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:dell:thinos:2408:*:*:*:*:*:*:*",
"matchCriteriaId": "8F71D748-6B04-4EB2-865C-63291F8A4226",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell ThinOS version 2408 contains a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges."
},
{
"lang": "es",
"value": "La versi\u00f3n 2408 de Dell ThinOS contiene una vulnerabilidad de condici\u00f3n de ejecuci\u00f3n de tiempo de uso y tiempo de verificaci\u00f3n (TOCTOU). Un atacante con pocos privilegios y acceso local podr\u00eda aprovechar esta vulnerabilidad, lo que provocar\u00eda una elevaci\u00f3n de privilegios."
}
],
"id": "CVE-2024-53289",
"lastModified": "2025-02-04T16:13:48.413",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "security_alert@emc.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.0,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2024-12-11T08:15:06.010",
"references": [
{
"source": "security_alert@emc.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000248475/dsa-2024-463"
}
],
"sourceIdentifier": "security_alert@emc.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-367"
}
],
"source": "security_alert@emc.com",
"type": "Secondary"
}
]
}
CVE-2025-43729 (GCVE-0-2025-43729)
Vulnerability from cvelistv5 – Published: 2025-08-27 14:02 – Updated: 2025-08-28 03:55
VLAI?
Summary
Dell ThinOS 10, versions prior to 2508_10.0127, contains an Incorrect Permission Assignment for Critical Resource vulnerability. A local low-privileged attacker could potentially exploit this vulnerability leading to Elevation of Privileges and Unauthorized Access.
Severity ?
7.8 (High)
CWE
- CWE-732 - Incorrect Permission Assignment for Critical Resource
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-43729",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-27T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-28T03:55:25.732Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "ThinOS 10",
"vendor": "Dell",
"versions": [
{
"lessThan": "2508_10.0127",
"status": "affected",
"version": "N/A",
"versionType": "semver"
}
]
}
],
"datePublic": "2025-08-26T17:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dell ThinOS 10, versions prior to 2508_10.0127, contains an Incorrect Permission Assignment for Critical Resource vulnerability. A local low-privileged attacker could potentially exploit this vulnerability leading to Elevation of Privileges and Unauthorized Access."
}
],
"value": "Dell ThinOS 10, versions prior to 2508_10.0127, contains an Incorrect Permission Assignment for Critical Resource vulnerability. A local low-privileged attacker could potentially exploit this vulnerability leading to Elevation of Privileges and Unauthorized Access."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-732",
"description": "CWE-732: Incorrect Permission Assignment for Critical Resource",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-27T14:02:47.196Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000359619/dsa-2025-331"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2025-43729",
"datePublished": "2025-08-27T14:02:47.196Z",
"dateReserved": "2025-04-17T05:03:55.667Z",
"dateUpdated": "2025-08-28T03:55:25.732Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-43730 (GCVE-0-2025-43730)
Vulnerability from cvelistv5 – Published: 2025-08-27 13:57 – Updated: 2025-08-28 03:55
VLAI?
Summary
Dell ThinOS 10, versions prior to 2508_10.0127, contains an Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability. A local unauthenticated user could potentially exploit this vulnerability leading to Elevation of Privileges and Information disclosure.
Severity ?
8.4 (High)
CWE
- CWE-88 - Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-43730",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-27T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-28T03:55:24.667Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "ThinOS 10",
"vendor": "Dell",
"versions": [
{
"lessThan": "2508_10.0127",
"status": "affected",
"version": "N/A",
"versionType": "semver"
}
]
}
],
"datePublic": "2025-08-26T17:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dell ThinOS 10, versions prior to 2508_10.0127, contains an Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027) vulnerability. A local unauthenticated user could potentially exploit this vulnerability leading to Elevation of Privileges and Information disclosure."
}
],
"value": "Dell ThinOS 10, versions prior to 2508_10.0127, contains an Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027) vulnerability. A local unauthenticated user could potentially exploit this vulnerability leading to Elevation of Privileges and Information disclosure."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-88",
"description": "CWE-88: Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-27T13:57:39.797Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000359619/dsa-2025-331"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2025-43730",
"datePublished": "2025-08-27T13:57:39.797Z",
"dateReserved": "2025-04-17T05:03:55.667Z",
"dateUpdated": "2025-08-28T03:55:24.667Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-43882 (GCVE-0-2025-43882)
Vulnerability from cvelistv5 – Published: 2025-08-27 13:51 – Updated: 2025-08-28 03:55
VLAI?
Summary
Dell ThinOS 10, versions prior to 2508_10.0127, contains an Unverified Ownership vulnerability. A local low-privileged attacker could potentially exploit this vulnerability leading to Unauthorized Access.
Severity ?
7.8 (High)
CWE
- CWE-283 - Unverified Ownership
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Credits
Dell Technologies would like to thank Brandon Schreiber for reporting this vulnerability.
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-43882",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-27T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-28T03:55:23.169Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "ThinOS 10",
"vendor": "Dell",
"versions": [
{
"lessThan": "2508_10.0127",
"status": "affected",
"version": "N/A",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Dell Technologies would like to thank Brandon Schreiber for reporting this vulnerability."
}
],
"datePublic": "2025-08-26T17:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dell ThinOS 10, versions prior to 2508_10.0127, contains an Unverified Ownership vulnerability. A local low-privileged attacker could potentially exploit this vulnerability leading to Unauthorized Access."
}
],
"value": "Dell ThinOS 10, versions prior to 2508_10.0127, contains an Unverified Ownership vulnerability. A local low-privileged attacker could potentially exploit this vulnerability leading to Unauthorized Access."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-283",
"description": "CWE-283: Unverified Ownership",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-27T13:51:40.130Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000359619/dsa-2025-331"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2025-43882",
"datePublished": "2025-08-27T13:51:40.130Z",
"dateReserved": "2025-04-18T05:05:05.740Z",
"dateUpdated": "2025-08-28T03:55:23.169Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-43728 (GCVE-0-2025-43728)
Vulnerability from cvelistv5 – Published: 2025-08-27 13:44 – Updated: 2025-08-28 03:55
VLAI?
Summary
Dell ThinOS 10, versions prior to 2508_10.0127, contain a Protection Mechanism Failure vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Protection mechanism bypass.
Severity ?
9.6 (Critical)
CWE
- CWE-693 - Protection Mechanism Failure
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-43728",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-27T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-28T03:55:21.730Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "ThinOS 10",
"vendor": "Dell",
"versions": [
{
"lessThan": "2508_10.0127",
"status": "affected",
"version": "N/A",
"versionType": "semver"
}
]
}
],
"datePublic": "2025-08-26T17:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dell ThinOS 10, versions prior to 2508_10.0127, contain a Protection Mechanism Failure vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Protection mechanism bypass."
}
],
"value": "Dell ThinOS 10, versions prior to 2508_10.0127, contain a Protection Mechanism Failure vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Protection mechanism bypass."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-693",
"description": "CWE-693: Protection Mechanism Failure",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-27T13:44:25.996Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000359619/dsa-2025-331"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2025-43728",
"datePublished": "2025-08-27T13:44:25.996Z",
"dateReserved": "2025-04-17T05:03:55.667Z",
"dateUpdated": "2025-08-28T03:55:21.730Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-32752 (GCVE-0-2025-32752)
Vulnerability from cvelistv5 – Published: 2025-05-29 18:53 – Updated: 2025-06-12 16:34
VLAI?
Summary
Dell ThinOS 2502 and prior contain a Cleartext Storage of Sensitive Information vulnerability. A high privileged attacker with physical access could potentially exploit this vulnerability, leading to Information Disclosure.
Severity ?
5.7 (Medium)
CWE
- CWE-312 - Cleartext Storage of Sensitive Information
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Credits
Dell Technologies would like to thank Darren McDonald at AmberWolf for reporting this issue.
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-32752",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-05-29T19:05:53.778564Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-05-29T19:06:30.703Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "ThinOS",
"vendor": "Dell",
"versions": [
{
"lessThan": "2505",
"status": "affected",
"version": "N/A",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Dell Technologies would like to thank Darren McDonald at AmberWolf for reporting this issue."
}
],
"datePublic": "2025-05-29T17:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dell ThinOS 2502 and prior contain a Cleartext Storage of Sensitive Information vulnerability. A high privileged attacker with physical access could potentially exploit this vulnerability, leading to Information Disclosure.\u003cbr\u003e"
}
],
"value": "Dell ThinOS 2502 and prior contain a Cleartext Storage of Sensitive Information vulnerability. A high privileged attacker with physical access could potentially exploit this vulnerability, leading to Information Disclosure."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "LOW",
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-312",
"description": "CWE-312: Cleartext Storage of Sensitive Information",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-06-12T16:34:16.735Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000325632/dsa-2025-225"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2025-32752",
"datePublished": "2025-05-29T18:53:52.910Z",
"dateReserved": "2025-04-10T05:03:51.740Z",
"dateUpdated": "2025-06-12T16:34:16.735Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-27688 (GCVE-0-2025-27688)
Vulnerability from cvelistv5 – Published: 2025-03-18 15:55 – Updated: 2025-03-19 03:55
VLAI?
Summary
Dell ThinOS 2408 and prior, contains an improper permissions vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.
Severity ?
7.8 (High)
CWE
- CWE-732 - Incorrect Permission Assignment for Critical Resource
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dell | Wyse Proprietary OS (Modern ThinOS) |
Affected:
N/A , < ThinOS 2502
(semver)
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-27688",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-18T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-19T03:55:50.783Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Wyse Proprietary OS (Modern ThinOS)",
"vendor": "Dell",
"versions": [
{
"lessThan": "ThinOS 2502",
"status": "affected",
"version": "N/A",
"versionType": "semver"
}
]
}
],
"datePublic": "2025-03-18T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dell ThinOS 2408 and prior, contains an improper permissions vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.\u003cbr\u003e"
}
],
"value": "Dell ThinOS 2408 and prior, contains an improper permissions vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-732",
"description": "CWE-732: Incorrect Permission Assignment for Critical Resource",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-18T15:55:44.470Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000289886/dsa-2025-107"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2025-27688",
"datePublished": "2025-03-18T15:55:44.470Z",
"dateReserved": "2025-03-05T07:33:28.315Z",
"dateUpdated": "2025-03-19T03:55:50.783Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-26331 (GCVE-0-2025-26331)
Vulnerability from cvelistv5 – Published: 2025-03-07 08:06 – Updated: 2025-03-11 03:55
VLAI?
Summary
Dell ThinOS 2411 and prior, contains an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary code execution.
Severity ?
7.8 (High)
CWE
- CWE-77 - Improper Neutralization of Special Elements used in a Command ('Command Injection')
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dell | Wyse Proprietary OS (Modern ThinOS) |
Affected:
N/A , < ThinOS 2502
(semver)
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-26331",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-10T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-11T03:55:16.832Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"third-party-advisory"
],
"url": "https://www.incibe.es/incibe-cert/alerta-temprana/vulnerabilidades/cve-2025-26331"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"modules": [
"ThinOS",
"Latitude 3420",
"Latitude 3440",
"Latitude 5440",
"Latitude 5450",
"OptiPlex 3000 Thin Client",
"OptiPlex 5400 All-in-One",
"OptiPlex AIO 7410",
"OptiPlex AIO 7420",
"Wyse 5070 Thin Client",
"Wyse 5470 All-in-One Thin Client",
"Wyse 5470 Mobile Thin Client"
],
"product": "Wyse Proprietary OS (Modern ThinOS)",
"vendor": "Dell",
"versions": [
{
"lessThan": "ThinOS 2502",
"status": "affected",
"version": "N/A",
"versionType": "semver"
}
]
}
],
"datePublic": "2025-03-04T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dell ThinOS 2411 and prior, contains an Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027) vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary code execution.\u003cbr\u003e"
}
],
"value": "Dell ThinOS 2411 and prior, contains an Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027) vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary code execution."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-77",
"description": "CWE-77: Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-07T08:06:12.680Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000289886/dsa-2025-107"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2025-26331",
"datePublished": "2025-03-07T08:06:12.680Z",
"dateReserved": "2025-02-07T06:04:04.738Z",
"dateUpdated": "2025-03-11T03:55:16.832Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-53289 (GCVE-0-2024-53289)
Vulnerability from cvelistv5 – Published: 2024-12-11 07:40 – Updated: 2024-12-11 15:08
VLAI?
Summary
Dell ThinOS version 2408 contains a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.
Severity ?
7.8 (High)
CWE
- CWE-367 - Time-of-check Time-of-use (TOCTOU) Race Condition
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dell | Wyse Proprietary OS (Modern ThinOS) |
Affected:
ThinOS 2408
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-53289",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-12-11T15:07:07.575760Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-12-11T15:08:48.831Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Wyse Proprietary OS (Modern ThinOS)",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "ThinOS 2408"
}
]
}
],
"datePublic": "2024-12-02T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dell ThinOS version 2408 contains a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges."
}
],
"value": "Dell ThinOS version 2408 contains a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-367",
"description": "CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-11T07:40:46.895Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000248475/dsa-2024-463"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2024-53289",
"datePublished": "2024-12-11T07:40:46.895Z",
"dateReserved": "2024-11-20T06:05:04.566Z",
"dateUpdated": "2024-12-11T15:08:48.831Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-53290 (GCVE-0-2024-53290)
Vulnerability from cvelistv5 – Published: 2024-12-11 07:34 – Updated: 2024-12-11 15:06
VLAI?
Summary
Dell ThinOS version 2408 contains an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability, leading to Command execution
Severity ?
8.4 (High)
CWE
- CWE-77 - Improper Neutralization of Special Elements used in a Command ('Command Injection')
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dell | Wyse Proprietary OS (Modern ThinOS) |
Affected:
ThinOS 2408
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-53290",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-12-11T15:06:31.131210Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-12-11T15:06:53.223Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Wyse Proprietary OS (Modern ThinOS)",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "ThinOS 2408"
}
]
}
],
"datePublic": "2024-12-02T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dell ThinOS version 2408 contains an Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027) vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability, leading to Command execution"
}
],
"value": "Dell ThinOS version 2408 contains an Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027) vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability, leading to Command execution"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-77",
"description": "CWE-77: Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-11T07:34:47.345Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000248475/dsa-2024-463"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2024-53290",
"datePublished": "2024-12-11T07:34:47.345Z",
"dateReserved": "2024-11-20T06:05:04.566Z",
"dateUpdated": "2024-12-11T15:06:53.223Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}