SB2025052622 - Two privilege escalation vulnerabilities in Dell Trusted Device
Published: May 26, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Link following (CVE-ID: CVE-2025-29983)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to an insecure link following issue. A local user can create a specially crafted symbolic link to a critical file on the system and overwrite it with privileges of the application.
2) Incorrect default permissions (CVE-ID: CVE-2025-29984)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to incorrect default permissions for files and folders that are set by the application. A local user with access to the system can view contents of files and directories or modify them.
Remediation
Install update from vendor's website.