CVE-2025-46685
Published: 13 January 2026
Summary
CVE-2025-46685 is a high-severity Creation of Temporary File With Insecure Permissions (CWE-378) vulnerability in Dell Supportassist Os Recovery. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique File System Permissions Weakness (T1044); ranked at the 2.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Insecure temp file permissions (CWE-378) directly enables local privilege escalation via file system weaknesses.
NVD Description
Dell SupportAssist OS Recovery, versions prior to 5.5.15.1, contain a Creation of Temporary File With Insecure Permissions vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.
Deeper analysisAI
Dell SupportAssist OS Recovery, versions prior to 5.5.15.1, is affected by CVE-2025-46685, a Creation of Temporary File With Insecure Permissions vulnerability (CWE-378). This flaw allows insecure handling of temporary files, which can be exploited under specific conditions. The vulnerability carries a CVSS v3.1 base score of 7.5 (High), with vector AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H, indicating local access vector, high attack complexity, low privileges required, user interaction needed, changed scope, and high impacts on confidentiality, integrity, and availability.
A low-privileged attacker with local access to the system can potentially exploit this vulnerability to achieve elevation of privileges. Exploitation requires high complexity and user interaction, such as tricking the user into specific actions, but success could grant the attacker escalated rights, enabling full control over the system including high-impact data access, modification, and disruption.
Dell has issued security advisory DSA-2025-456 at https://www.dell.com/support/kbdoc/en-us/000401506/dsa-2025-456, which provides details on the vulnerability and recommends updating to version 5.5.15.1 or later to mitigate the issue. Security practitioners should verify patch deployment on affected systems.
Details
- CWE(s)