Update

Alienware Command Center Suite

Alienware Command Center Suite

View all applications
Patching for Windows Mac Linux

CVE Vulnerabilities for Alienware Command Center Suite

CVEPublishedSeverityDetailsExploitabilityImpact Vector
CVE‑2024‑383012024‑07‑10 03:15:02HIGH (8)Dell Alienware Command Center, version 5.7.3.0 and prior, contains an improper access control vulnerability. A low privileged attacker could potentially exploit this vulnerability, leading to denial of service on the local system and information disclosure.26LOCAL
CVE‑2024‑224502024‑04‑10 07:15:09HIGH (7)Dell Alienware Command Center, versions prior to 6.2.7.0, contain an uncontrolled search path element vulnerability. A local malicious user could potentially inject malicious files in the file search path, leading to system compromise.16LOCAL
CVE‑2024‑01592024‑04‑10 07:15:08MEDIUM (7)Dell Alienware Command Center, versions 5.5.52.0 and prior, contain improper access control vulnerability, leading to Denial of Service on local system.16LOCAL
CVE‑2023‑280722023‑09‑04 16:15:08HIGH (8) Dell Alienware Command Center, versions prior to 5.5.51.0, contain a deserialization of untrusted data vulnerability. A local malicious user could potentially send specially crafted requests to the .NET Remoting server to run arbitrary code on the system. 26LOCAL
CVE‑2023‑280702023‑05‑03 09:15:09HIGH (8) Alienware Command Center Application, versions 5.5.43.0 and prior, contain an improper access control vulnerability. A local malicious user could potentially exploit this vulnerability during installation or update process leading to privilege escalation. 26LOCAL
CVE‑2023‑245692023‑02‑10 13:15:11HIGH (8) Dell Alienware Command Center versions 5.5.37.0 and prior contain an Improper Input validation vulnerability. A local authenticated malicious user could potentially send malicious input to a named pipe in order to elevate privileges on the system. 26LOCAL
Windows Mac Linux

What applications does Lavawall® monitor?

Lavawall monitors patches for over 7,500 applications. This is a summary of the most popular applications.
Click here for the full list.
Click the applications below for the current version and known vulnerabilities.
Logos are property of their respective trademark holders and are not affiliated with ThreeShield or Lavawall. We have not audited the security of most of the listed tools.
Logos, products, trade names, and company names are all the property of their respective trademark holders.
The above listing includes products that Lavawall® monitors through public information and/or proprietary statistical analysis.
Although we do have a partner relationship with some of the listed products and companies, they do not necessarily endorse Lavawall® or have integrations with our systems.