Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2020-5385 : What You Need to Know

Learn about CVE-2020-5385, a privilege escalation vulnerability in Dell Encryption Enterprise and Dell Endpoint Security Suite versions < 10.8. Understand the impact, affected systems, and mitigation steps.

Dell Encryption versions prior to 10.8 and Dell Endpoint Security Suite versions prior to 2.8 contain a privilege escalation vulnerability due to an incomplete fix for CVE-2020-5358. This vulnerability could allow a local malicious user to elevate privileges on the affected system.

Understanding CVE-2020-5385

This CVE involves a privilege escalation vulnerability in Dell Encryption and Dell Endpoint Security Suite versions.

What is CVE-2020-5385?

CVE-2020-5385 is a vulnerability in Dell Encryption Enterprise and Dell Endpoint Security Suite versions prior to 10.8 and 2.8, respectively. It allows a local user with low privileges to gain elevated privileges on the system through a symbolic link exploit.

The Impact of CVE-2020-5385

The vulnerability has a CVSS base score of 6.7, indicating a medium severity issue. It can lead to high impacts on confidentiality, integrity, and availability of the affected systems.

Technical Details of CVE-2020-5385

This section provides more technical insights into the vulnerability.

Vulnerability Description

The vulnerability arises from an incomplete fix for CVE-2020-5358, enabling a local malicious user to exploit it for privilege escalation.

Affected Systems and Versions

        Product: Dell Encryption Enterprise
        Vendor: Dell
        Versions Affected: < 10.8

Exploitation Mechanism

        Attack Complexity: High
        Attack Vector: Local
        Privileges Required: Low
        User Interaction: Required
        Scope: Unchanged
        Availability Impact: High
        Confidentiality Impact: High
        Integrity Impact: High

Mitigation and Prevention

To address CVE-2020-5385, follow these mitigation strategies:

Immediate Steps to Take

        Update Dell Encryption Enterprise and Dell Endpoint Security Suite to versions 10.8 and 2.8, respectively.
        Monitor system logs for any suspicious activities.

Long-Term Security Practices

        Implement the principle of least privilege to restrict user access.
        Conduct regular security training for employees to raise awareness of potential threats.

Patching and Updates

        Apply security patches and updates promptly to ensure system protection.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now