Update

Alienware Command Center Suite

Alienware Command Center Suite

View all applications

CVE Vulnerabilities for Alienware Command Center Suite

CVEPublishedSeverityDetailsExploitabilityImpact Vector
CVE‑2025‑463702025‑11‑13 20:15:50LOW (3)Dell Alienware Command Center 6.x (AWCC), versions prior to 6.10.15.0, contain a Process Control vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Information Disclosure.13LOCAL
CVE‑2025‑463692025‑11‑13 20:15:50HIGH (8)Dell Alienware Command Center 6.x (AWCC), versions prior to 6.10.15.0, contains an Insecure Temporary File vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Privilege Escalation.26LOCAL
CVE‑2025‑463682025‑11‑13 20:15:50MEDIUM (7)Dell Alienware Command Center 6.x (AWCC), versions prior to 6.10.15.0, contains an Insecure Temporary File vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Information tampering.25LOCAL
CVE‑2025‑463672025‑11‑13 20:15:50HIGH (8)Dell Alienware Command Center 6.x (AWCC), versions prior to 6.10.15.0, contain a Detection of Error Condition Without Action vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Arbitrary Code Execution.26LOCAL
CVE‑2025‑463622025‑11‑13 20:15:50MEDIUM (7)Dell Alienware Command Center 6.x (AWCC), versions prior to 6.10.15.0, contain an Improper Access Control vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Information Tampering.25LOCAL
CVE‑2025‑437262025‑09‑02 19:15:31MEDIUM (7)Dell Alienware Command Center 5.x (AWCC), versions prior to 5.10.2.0, contains an Improper Link Resolution Before File Access ('Link Following')" vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.16LOCAL
CVE‑2024‑383012024‑07‑10 03:15:02MEDIUM (7)Dell Alienware Command Center, version 5.7.3.0 and prior, contains an improper access control vulnerability. A low privileged attacker could potentially exploit this vulnerability, leading to denial of service on the local system and information disclosure.16LOCAL
CVE‑2024‑224502024‑04‑10 07:15:09HIGH (7)Dell Alienware Command Center, versions prior to 6.2.7.0, contain an uncontrolled search path element vulnerability. A local malicious user could potentially inject malicious files in the file search path, leading to system compromise.16LOCAL
CVE‑2024‑01592024‑04‑10 07:15:08MEDIUM (7)Dell Alienware Command Center, versions 5.5.52.0 and prior, contain improper access control vulnerability, leading to Denial of Service on local system.16LOCAL
CVE‑2023‑280722023‑09‑04 16:15:08HIGH (8) Dell Alienware Command Center, versions prior to 5.5.51.0, contain a deserialization of untrusted data vulnerability. A local malicious user could potentially send specially crafted requests to the .NET Remoting server to run arbitrary code on the system. 26LOCAL
CVE‑2023‑280702023‑05‑03 09:15:09HIGH (8) Alienware Command Center Application, versions 5.5.43.0 and prior, contain an improper access control vulnerability. A local malicious user could potentially exploit this vulnerability during installation or update process leading to privilege escalation. 26LOCAL
CVE‑2023‑245692023‑02‑10 13:15:11HIGH (8) Dell Alienware Command Center versions 5.5.37.0 and prior contain an Improper Input validation vulnerability. A local authenticated malicious user could potentially send malicious input to a named pipe in order to elevate privileges on the system. 26LOCAL

View OS-specific patching for:
Windows Mac Linux
Logos, products, trade names, and company names are all the property of their respective trademark holders.
The above listing includes products that Lavawall® monitors through public information and/or proprietary statistical analysis.
Although we do have a partner relationship with some of the listed products and companies, they do not necessarily endorse Lavawall® or have integrations with our systems.