ID

VAR-202603-1955


CVE

CVE-2026-24510


TITLE

Dell's Alienware Command Center Vulnerability in privilege management in

Trust: 0.8

sources: JVNDB: JVNDB-2026-007609

DESCRIPTION

Dell Alienware Command Center (AWCC), versions prior to 6.12.24.0, contain an Improper Privilege Management vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges. All information handled by the software may be rewritten. Furthermore, the software may stop working completely. Furthermore, attacks that exploit this vulnerability will not affect other software

Trust: 1.62

sources: NVD: CVE-2026-24510 // JVNDB: JVNDB-2026-007609

AFFECTED PRODUCTS

vendor:dellmodel:alienware command centerscope:ltversion:6.12.24.0

Trust: 1.0

vendor:デルmodel:alienware command centerscope: - version: -

Trust: 0.8

vendor:デルmodel:alienware command centerscope:eqversion:6.12.24.0

Trust: 0.8

vendor:デルmodel:alienware command centerscope:eqversion: -

Trust: 0.8

sources: JVNDB: JVNDB-2026-007609 // NVD: CVE-2026-24510

CVSS

SEVERITY

CVSSV2

CVSSV3

security_alert@emc.com: CVE-2026-24510
value: MEDIUM

Trust: 1.0

nvd@nist.gov: CVE-2026-24510
value: HIGH

Trust: 1.0

NVD: CVE-2026-24510
value: HIGH

Trust: 0.8

security_alert@emc.com: CVE-2026-24510
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: HIGH
privilegesRequired: LOW
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.8
impactScore: 5.9
version: 3.1

Trust: 1.0

nvd@nist.gov: CVE-2026-24510
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2026-24510
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2026-007609 // NVD: CVE-2026-24510 // NVD: CVE-2026-24510

PROBLEMTYPE DATA

problemtype:CWE-269

Trust: 1.0

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:Improper authority management (CWE-269) [ others ]

Trust: 0.8

problemtype: Lack of information (CWE-noinfo) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2026-007609 // NVD: CVE-2026-24510

PATCH

title:DSA-2026-093url:https://www.dell.com/support/kbdoc/en-us/000427573/dsa-2026-093

Trust: 0.8

sources: JVNDB: JVNDB-2026-007609

EXTERNAL IDS

db:NVDid:CVE-2026-24510

Trust: 2.6

db:JVNDBid:JVNDB-2026-007609

Trust: 0.8

sources: JVNDB: JVNDB-2026-007609 // NVD: CVE-2026-24510

REFERENCES

url:https://www.dell.com/support/kbdoc/en-us/000427573/dsa-2026-093

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2026-24510

Trust: 0.8

sources: JVNDB: JVNDB-2026-007609 // NVD: CVE-2026-24510

SOURCES

db:JVNDBid:JVNDB-2026-007609
db:NVDid:CVE-2026-24510

LAST UPDATE DATE

2026-03-18T23:21:30.147000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2026-007609date:2026-03-18T04:26:00
db:NVDid:CVE-2026-24510date:2026-03-16T20:28:29.490

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2026-007609date:2026-03-18T00:00:00
db:NVDid:CVE-2026-24510date:2026-03-11T20:16:14.630