CVE Vulnerabilities for Alienware Command Center Suite
| CVE | Published | Severity | Details | Exploitability | Impact | Vector |
|---|---|---|---|---|---|---|
| CVE‑2025‑46370 | 2025‑11‑13 20:15:50 | LOW (3) | Dell Alienware Command Center 6.x (AWCC), versions prior to 6.10.15.0, contain a Process Control vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Information Disclosure. | 1 | 3 | LOCAL |
| CVE‑2025‑46369 | 2025‑11‑13 20:15:50 | HIGH (8) | Dell Alienware Command Center 6.x (AWCC), versions prior to 6.10.15.0, contains an Insecure Temporary File vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Privilege Escalation. | 2 | 6 | LOCAL |
| CVE‑2025‑46368 | 2025‑11‑13 20:15:50 | MEDIUM (7) | Dell Alienware Command Center 6.x (AWCC), versions prior to 6.10.15.0, contains an Insecure Temporary File vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Information tampering. | 2 | 5 | LOCAL |
| CVE‑2025‑46367 | 2025‑11‑13 20:15:50 | HIGH (8) | Dell Alienware Command Center 6.x (AWCC), versions prior to 6.10.15.0, contain a Detection of Error Condition Without Action vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Arbitrary Code Execution. | 2 | 6 | LOCAL |
| CVE‑2025‑46362 | 2025‑11‑13 20:15:50 | MEDIUM (7) | Dell Alienware Command Center 6.x (AWCC), versions prior to 6.10.15.0, contain an Improper Access Control vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Information Tampering. | 2 | 5 | LOCAL |
| CVE‑2025‑43726 | 2025‑09‑02 19:15:31 | MEDIUM (7) | Dell Alienware Command Center 5.x (AWCC), versions prior to 5.10.2.0, contains an Improper Link Resolution Before File Access ('Link Following')" vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges. | 1 | 6 | LOCAL |
| CVE‑2024‑38301 | 2024‑07‑10 03:15:02 | MEDIUM (7) | Dell Alienware Command Center, version 5.7.3.0 and prior, contains an improper access control vulnerability. A low privileged attacker could potentially exploit this vulnerability, leading to denial of service on the local system and information disclosure. | 1 | 6 | LOCAL |
| CVE‑2024‑22450 | 2024‑04‑10 07:15:09 | HIGH (7) | Dell Alienware Command Center, versions prior to 6.2.7.0, contain an uncontrolled search path element vulnerability. A local malicious user could potentially inject malicious files in the file search path, leading to system compromise. | 1 | 6 | LOCAL |
| CVE‑2024‑0159 | 2024‑04‑10 07:15:08 | MEDIUM (7) | Dell Alienware Command Center, versions 5.5.52.0 and prior, contain improper access control vulnerability, leading to Denial of Service on local system. | 1 | 6 | LOCAL |
| CVE‑2023‑28072 | 2023‑09‑04 16:15:08 | HIGH (8) | Dell Alienware Command Center, versions prior to 5.5.51.0, contain a deserialization of untrusted data vulnerability. A local malicious user could potentially send specially crafted requests to the .NET Remoting server to run arbitrary code on the system. | 2 | 6 | LOCAL |
| CVE‑2023‑28070 | 2023‑05‑03 09:15:09 | HIGH (8) | Alienware Command Center Application, versions 5.5.43.0 and prior, contain an improper access control vulnerability. A local malicious user could potentially exploit this vulnerability during installation or update process leading to privilege escalation. | 2 | 6 | LOCAL |
| CVE‑2023‑24569 | 2023‑02‑10 13:15:11 | HIGH (8) | Dell Alienware Command Center versions 5.5.37.0 and prior contain an Improper Input validation vulnerability. A local authenticated malicious user could potentially send malicious input to a named pipe in order to elevate privileges on the system. | 2 | 6 | LOCAL |
View OS-specific patching for:
Windows Mac Linux
Logos, products, trade names, and company names are all the property of their respective trademark holders.
The above listing includes products that Lavawall® monitors through public information and/or proprietary statistical analysis.
Although we do have a partner relationship with some of the listed products and companies, they do not necessarily endorse Lavawall® or have integrations with our systems.
