Search criteria
112 vulnerabilities found for latitude_3300_firmware by dell
CVE-2024-52541 (GCVE-0-2024-52541)
Vulnerability from nvd – Published: 2025-02-19 16:46 – Updated: 2025-02-19 17:08
VLAI?
Summary
Dell Client Platform BIOS contains a Weak Authentication vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.
Severity ?
8.2 (High)
CWE
- CWE-1390 - Weak Authentication
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dell | Dell Client Platform BIOS |
Affected:
N/A , < 1.34.0
(semver)
Affected: N/A , < 1.28.0 (semver) Affected: N/A , < 1.21.0 (semver) Affected: N/A , < 1.8.0 (semver) Affected: N/A , < 1.9.0 (semver) Affected: N/A , < 1.17.0 (semver) Affected: N/A , < 1.7.0 (semver) Affected: N/A , < 1.26.0 (semver) Affected: N/A , < 1.20.0 (semver) Affected: N/A , < 1.31.1 (semver) Affected: N/A , < 1.30.0 (semver) Affected: N/A , < 1.29.0 (semver) Affected: N/A , < 1.32.0 (semver) Affected: N/A , < 1.21.1 (semver) Affected: N/A , < 1.25.1 (semver) Affected: N/A , < 1.33.0 (semver) Affected: N/A , < 1.31.0 (semver) Affected: N/A , < 2.31.0 (semver) Affected: N/A , < 2.39.0 (semver) Affected: N/A , < 2.43.0 (semver) Affected: N/A , < 1.27.0 (semver) Affected: N/A , < 1.22.0 (semver) Affected: N/A , < 1.18.0 (semver) Affected: N/A , < 2.30.0 (semver) Affected: N/A , < 1.24.0 (semver) Affected: N/A , < 1.25.0 (semver) Affected: N/A , < 1.10.0 (semver) Affected: N/A , < 1.14.0 (semver) Affected: N/A , < 1.6.1 (semver) Affected: N/A , < 1.15.1 (semver) Affected: N/A , < 1.36.1 (semver) Affected: N/A , < 1.33.1 (semver) Affected: N/A , < 1.48.0 (semver) Affected: N/A , < 1.37.0 (semver) Affected: N/A , < 1.27.1 (semver) Affected: N/A , < 1.26.1 (semver) Affected: N/A , < 1.16.0 (semver) Affected: N/A , < 1.35.1 (semver) Affected: N/A , < 1.32.1 (semver) Affected: N/A , < 1.38.0 (semver) Affected: N/A , < 1.40.0 (semver) Affected: N/A , < 1.35.0 (semver) Affected: N/A , < 1.36.0 (semver) Affected: N/A , < 1.41.0 (semver) Affected: N/A , < 1.31.2 (semver) Affected: N/A , < 1.18.1 (semver) Affected: N/A , < 1.39.0 (semver) Affected: N/A , < 1.53.0 (semver) Affected: N/A , < 1.19.1 (semver) Affected: N/A , < 1.38.1 (semver) Affected: N/A , < 1.7.1 (semver) Affected: N/A , < 1.8.1 (semver) Affected: N/A , < 1.23.0 (semver) Affected: N/A , < 1.34.1 (semver) Affected: N/A , < 1.23.2 (semver) Affected: N/A , < 1.30.1 (semver) Affected: N/A , < 2.28.1 (semver) Affected: N/A , < 2.22.1 (semver) Affected: N/A , < 1.28.1 (semver) Affected: N/A , < 1.1.44 (semver) Affected: N/A , < 3.10.0 (semver) Affected: N/A , < 1.6.0 (semver) Affected: N/A , < 2.33.0 (semver) Affected: N/A , < 2.20.0 (semver) Affected: N/A , < 2.34.0 (semver) Affected: N/A , < 1.15.0 (semver) Affected: N/A , < 1.34.8 (semver) Affected: N/A , < 1.9.1 (semver) Affected: N/A , < 2.6.1 (semver) Affected: N/A , < 01.11.02 (semver) Affected: N/A , < 2.31.1 (semver) Affected: N/A , < 3.27.1 (semver) Affected: N/A , < 2.29.1 (semver) Affected: N/A , < 2.18.1 (semver) Affected: N/A , < 1.13.0 (semver) Affected: N/A , < 1.11.0 (semver) Affected: N/A , < 1.11.1 (semver) Affected: N/A , < 2.24.1 (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-52541",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-19T17:07:39.827843Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-02-19T17:08:48.094Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"modules": [
"Alienware m15 R6",
"Alienware m15 R7",
"Alienware m16 R1",
"Alienware m16 R2",
"Alienware M18 R2",
"Alienware x14 R2",
"Alienware X16 R2",
"ChengMing 3900",
"ChengMing 3910/3911",
"ChengMing 3990",
"Dell Edge Gateway 5000",
"Dell G15 5510",
"Dell G15 5511",
"Dell G15 5530",
"Dell G5 5000",
"Dell Precision 3430 Tower",
"Dell Precision 3431 Tower",
"Dell Precision 3630 Tower",
"Dell Precision 5820 Tower",
"Dell Precision 7820 Tower",
"Embedded Box PC 5000",
"Inspiron 13 5320",
"Inspiron 13 5330",
"Inspiron 14\u00a0 5410/5418",
"Inspiron 14 5420",
"Inspiron 14 Plus 7420",
"Inspiron 14 Plus 7440",
"Inspiron 15 3530",
"Inspiron 16 5640",
"Inspiron 24 5420 All-in-One",
"Inspiron 5301",
"Inspiron 5400/5401",
"Latitude 12 Rugged Extreme 7214",
"Latitude 3190",
"Latitude 3310",
"Latitude 3310 2-In-1",
"Latitude 3340",
"Latitude 3400",
"Latitude 3410",
"Latitude 3420",
"Latitude 5320",
"Latitude 5400",
"Latitude 5401",
"Latitude 5420",
"Latitude 5430 Rugged Laptop",
"Latitude 5440",
"Latitude 5480",
"Latitude 7212 Rugged Extreme Tablet",
"Latitude 7230 Rugged Extreme",
"Latitude 7320",
"Latitude 7350 Detachable",
"Latitude 7450",
"Latitude 9330",
"Latitude 9420",
"OptiPlex 3000 Thin Client",
"OptiPlex 3070",
"OptiPlex 3080",
"OptiPlex 3090",
"OptiPlex 5080",
"OptiPlex 5400 All-In-One",
"Precision 3260 XE Compact / Precision 3260 Compact",
"Precision 3280 CFF",
"Precision 3420 Tower",
"Precision 3660",
"Precision 3930 Rack",
"Precision 5480",
"Precision 5530 2-In-1",
"Precision 5690",
"Precision 5860 Tower",
"Precision 7875 Tower",
"Vostro 3681",
"XPS 13 9310",
"XPS 13 9310 2-in-1",
"XPS 13 Plus 9320",
"XPS 13 9340",
"XPS 14 9440",
"XPS 16 9640",
"XPS 8940"
],
"product": "Dell Client Platform BIOS",
"vendor": "Dell",
"versions": [
{
"lessThan": "1.34.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.28.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.21.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.8.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.9.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.17.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.7.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.26.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.20.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.30.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.29.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.32.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.21.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.25.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.33.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.31.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.39.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.43.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.27.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.22.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.18.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.30.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.24.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.25.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.10.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.14.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.6.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.15.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.36.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.33.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.48.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.37.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.27.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.26.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.16.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.35.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.32.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.38.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.40.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.35.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.36.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.41.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.18.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.39.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.53.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.19.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.38.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.7.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.8.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.23.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.34.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.23.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.30.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.28.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.22.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.28.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.1.44",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "3.10.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.6.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.33.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.20.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.34.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.15.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.34.8",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.9.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.6.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "01.11.02",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.31.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "3.27.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.29.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.18.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.13.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.11.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.11.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.24.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
}
]
}
],
"datePublic": "2025-02-17T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dell Client Platform BIOS contains a Weak Authentication vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.\u003cbr\u003e"
}
],
"value": "Dell Client Platform BIOS contains a Weak Authentication vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-1390",
"description": "CWE-1390: Weak Authentication",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-02-19T16:46:22.803Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000258429/dsa-2025-021"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2024-52541",
"datePublished": "2025-02-19T16:46:22.803Z",
"dateReserved": "2024-11-12T06:04:07.776Z",
"dateUpdated": "2025-02-19T17:08:48.094Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-43078 (GCVE-0-2023-43078)
Vulnerability from nvd – Published: 2024-08-28 05:33 – Updated: 2024-08-28 22:31
VLAI?
Summary
Dell Dock Firmware and Dell Client Platform contain an Improper Link Resolution vulnerability during installation resulting in arbitrary folder deletion, which could lead to Privilege Escalation or Denial of Service.
Severity ?
6.7 (Medium)
CWE
- CWE-59 - Improper Link Resolution Before File Access ('Link Following')
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dell | Dell Client Platform, Dell Dock Firmware |
Affected:
N/A , < 1.27.0
(semver)
Affected: N/A , < 1.22.0 (semver) Affected: N/A , < 1.14.1 (semver) Affected: N/A , < 1.11.0 (semver) Affected: N/A , < 1.19.0 (semver) Affected: N/A , < 1.20.0 (semver) Affected: N/A , < 1.24.0 (semver) Affected: N/A , < 1.26.0 (semver) Affected: N/A , < 1.12.0 (semver) Affected: N/A , < 1.28.0 (semver) Affected: N/A , < 1.17.0 (semver) Affected: N/A , < 1.23.0 (semver) Affected: N/A , < 1.30.0 (semver) Affected: N/A , < 2.25.0 (semver) Affected: N/A , < 1.16.0 (semver) Affected: N/A , < 1.12.1 (semver) Affected: N/A , < 2.24.0 (semver) Affected: N/A , < 1.8.0 (semver) Affected: N/A , < 1.18.0 (semver) Affected: N/A , < 1.29.0 (semver) Affected: N/A , < 1.24.1 (semver) Affected: N/A , < 1.22.1 (semver) Affected: N/A , < 1.31.0 (semver) Affected: N/A , < 1.25.0 (semver) Affected: N/A , < 1.10.0 (semver) Affected: N/A , < 1.34.0 (semver) Affected: N/A , < 1.32.0 (semver) Affected: N/A , < 1.36.0 (semver) Affected: N/A , < 1.10.1 (semver) Affected: N/A , < 1.36.2 (semver) Affected: N/A , < 1.21.1 (semver) Affected: N/A , < 1.33.0 (semver) Affected: N/A , < 1.35.0 (semver) Affected: N/A , < 1.34.2 (semver) Affected: N/A , < 1.30.1 (semver) Affected: N/A , < 1.15.0 (semver) Affected: N/A , < 2.22.0 (semver) Affected: N/A , < 2.16.0 (semver) Affected: N/A , < 1.22.2 (semver) Affected: N/A , < 1.1.37 (semver) Affected: N/A , < 1.27.1 (semver) Affected: N/A , < 3.3.2 (semver) Affected: N/A , < 1.28.1 (semver) Affected: N/A , < 2.11.1 (semver) Affected: N/A , < 2.28.0 (semver) Affected: N/A , < 1.28.8 (semver) Affected: N/A , < 1.1.16 (semver) Affected: N/A , < 1.20.1 (semver) Affected: N/A , < 1.9.0 (semver) Affected: N/A , < 1.6.1 (semver) Affected: N/A , < 1.1.15 (semver) Affected: N/A , < 2.23.0 (semver) Affected: N/A , < 3.20.0 (semver) Affected: N/A , < 1.19.1 (semver) Affected: N/A , < 2.9.0 (semver) Affected: N/A , < 1.13.0 (semver) Affected: N/A , < 1.0.14.20 (semver) Affected: N/A , < 01.00.15 (semver) Affected: N/A , < 01.00.36 (semver) Affected: N/A , < 4.62.156.006 (semver) Affected: N/A , < 4.66.128.015 (semver) Affected: N/A , < 4.65.111.022 (semver) Affected: N/A , < 4.61.124.014 (semver) Affected: N/A , < 4.46.147.004 (semver) Affected: N/A , < 4.46.134.013 (semver) Affected: N/A , < 4.66.131.016 (semver) Affected: N/A , < 4.46.135.009 (semver) Affected: N/A , < 4.65.162.003 (semver) Affected: N/A , < 4.65.119.017 (semver) Affected: N/A , < 4.62.140.014 (semver) Affected: N/A , < 4.46.166.001 (semver) Affected: N/A , < 4.65.163.002 (semver) Affected: N/A , < 4.62.139.013 (semver) Affected: N/A , < 4.46.112.015 (semver) Affected: N/A , < 4.65.116.019 (semver) Affected: N/A , < 4.46.143.009 (semver) Affected: N/A , < 4.46.145.004 (semver) Affected: N/A , < 4.65.117.031 (semver) Affected: N/A , < 4.62.102.024 (semver) Affected: N/A , < 4.65.108.018 (semver) Affected: N/A , < 4.69.120.013 (semver) Affected: N/A , < 4.46.106.031 (semver) Affected: N/A , < 7.2.2.0 (semver) Affected: N/A , < 74.64 (semver) |
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:dell:wyse_5070_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3480_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3580_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3583_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3540_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3561_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7560_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7760_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7780_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7480_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5480_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_9420_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5521_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3320_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3580_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3480_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_m15_r6_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "alienware_m15_r6_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.27.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_17_9720_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:xps_13_9300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:wyse_5470_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_14_3420_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_15_3520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5570_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5080_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7070_ultra_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3120_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3310_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5310_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5310_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_15_3520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g16_7620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g15_5510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g15_5520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_m15_r7_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "alienware_m15_r7_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.22.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:alienware_m18_r1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_m16_r1_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "alienware_m16_r1_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.14.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:vostro_16_5630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3020_small_desktop_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3020_tower_desktop_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3480_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_all-in-one_7410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_micro_7010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_micro_plus_7010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_small_form_factor_7010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_small_form_factor_plus_7010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_tower_7010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_tower_plus_7010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5440_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7340_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7440_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3020_desktop_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3020_small_desktop_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_16_5630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_16_7630_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_14_5430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_14_7430_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:chengming_3911_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:chengming_3910_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_x16_r1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_x14_r2_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "alienware_x14_r2_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.11.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_13_9305_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3910_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_5620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3470_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5470_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_xe4_tower_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7000_micro_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7000_small_form_factor_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7000_tower_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7000_xe_micro_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5000_micro_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5000_small_form_factor_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5000_tower_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3000_micro_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3000_small_form_factor_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3000_tower_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3330_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5330_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5431_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3910_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_16_5620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_14_5420_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:chengming_3900_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "chengming_3900_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.19.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_15_9520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_15_7510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3471_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3671_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_7620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3571_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5570_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5531_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7330_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7530_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_9430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3671_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3471_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_16_plus_7620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_16_7610_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_15_7510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_14_plus_7420_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:chengming_3988_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "chengming_3988_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.20.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_17_9710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_5090_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5760_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3070_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5070_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7070_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7071_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_9510_2in1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7700_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5401_aio_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5401_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:chengming_3990_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:chengming_3991_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "chengming_3991_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.24.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_15_9500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_7500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3590_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_15_3510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3280_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5270_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7470_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7770_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7310_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7210_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7200_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5421_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7501_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_15_3511_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g15_5511_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "g15_5511_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.26.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_7230_rugged_extreme_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3140_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_16_plus_7630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_14_plus_7430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g16_7630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g15_5530_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "g15_5530_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.12.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_17_9700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3401_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3501_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_5402_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_5502_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3541_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_xe3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7060_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5060_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3060_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5401_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5501_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7320_detachable_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3501_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5402_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5406_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5409_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5502_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5509_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7306_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7506_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7706_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3430_tower_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g5_5500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g3_3500_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "g3_3500_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.28.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_9330_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_16_7620_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_14_7420_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g5_5000_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "g5_5000_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.17.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_13_7390_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:wyse_5470_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_5880_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3240_compact_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3440_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7080_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7330_rugged_laptop_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5430_rugged_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3310_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3431_tower_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g5_5090_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "g5_5090_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.23.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:precision_3530_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7760_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7460_all_in_one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5260_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5491_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5591_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:dell_g7_7500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:dell_g7_7700_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "dell_g7_7700_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.30.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:vostro_13_5310_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_13_5310_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3630_tower_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "precision_3630_tower_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "2.25.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:vostro_5320_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3530_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_13_5320_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_13_5320_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.16.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:inspiron_13_5330_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_13_5330_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.12.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:vostro_15_5510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_14_5410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_15_5510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_15_5518_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_14_5418_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_14_5410_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_14_5410_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "2.24.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:vostro_14_3430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_15_3530_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5480_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_9440_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_27_7720_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_24_5420_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_15_3530_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_15_3530_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.8.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:inspiron_27_7710_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_24_5410_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_24_5411_all-in-one_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_24_5411_all-in-one_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.18.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_13_7390_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7740_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7540_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7424_rugged_extreme_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5420_rugged_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5424_rugged_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5300_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3301_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5593_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3793_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3593_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_3593_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:inspiron_3881_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3880_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_3880_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.24.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:vostro_5890_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3890_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3690_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3891_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_3891_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.22.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:vostro_5301_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7730_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7530_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5290_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3190_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3190_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5301_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_5301_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.31.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_15_7590_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:xps_15_9510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5560_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5540_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3551_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7090_ultra_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3090_ultra_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_9410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7400_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5511_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5411_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3300_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_3300_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.25.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_15_9530_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5680_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3540_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3440_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3340_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_3340_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.10.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:precision_5530_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3420_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_3420_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.34.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_5590_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5290_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_5290_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.32.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:precision_3560_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5320_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_5320_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.36.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:precision_3580_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3581_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5540_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5340_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_5340_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.10.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_5420_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_5420_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.36.2",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:precision_3570_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5530_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_5530_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.21.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_rugged_7220_extreme_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7220_rugged_extreme_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_7220_rugged_extreme_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.33.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_7490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7390_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7290_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_7290_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.35.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_7520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7420_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7320_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_7320_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.34.2",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_9520_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_9520_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.30.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:optiplex_3000_thin_client_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "optiplex_3000_thin_client_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.15.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_13_9310_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3080_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "optiplex_3080_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "2.22.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_8940_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3090_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "optiplex_3090_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "2.16.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:optiplex_7090_tower_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5090_micro_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5090_small_form_factor_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5090_tower_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "optiplex_5090_tower_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.22.2",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:optiplex_7400_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5400_all-in-one_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "optiplex_5400_all-in-one_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.1.37",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:optiplex_7490_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5490_all-in-one_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "optiplex_5490_all-in-one_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.27.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:precision_3460_small_form_factor_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3460_xe_small_form_factor_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3260_compact_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3260_xe_compact_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "precision_3260_xe_compact_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "3.3.2",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:precision_3650_tower_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "precision_3650_tower_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.28.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:precision_3660_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "precision_3660_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "2.11.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-43078",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-28T14:17:19.963412Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-08-28T22:31:00.645Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Dell Client Platform, Dell Dock Firmware",
"vendor": "Dell",
"versions": [
{
"lessThan": "1.27.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.22.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.14.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.11.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.19.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.20.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.24.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.26.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.12.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.28.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.17.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.23.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.30.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.25.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.16.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.12.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.24.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.8.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.18.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.29.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.24.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.22.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.25.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.10.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.34.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.32.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.36.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.10.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.36.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.21.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.33.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.35.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.34.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.30.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.15.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.22.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.16.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.22.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.1.37",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.27.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "3.3.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.28.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.11.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.28.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.28.8",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.1.16",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.20.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.9.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.6.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.1.15",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.23.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "3.20.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.19.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.9.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.13.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.0.14.20",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "01.00.15",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "01.00.36",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.62.156.006",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.66.128.015",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.65.111.022",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.61.124.014",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.46.147.004",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.46.134.013",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.66.131.016",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.46.135.009",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.65.162.003",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.65.119.017",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.62.140.014",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.46.166.001",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.65.163.002",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.62.139.013",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.46.112.015",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.65.116.019",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.46.143.009",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.46.145.004",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.65.117.031",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.62.102.024",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.65.108.018",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.69.120.013",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.46.106.031",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "7.2.2.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "74.64",
"status": "affected",
"version": "N/A",
"versionType": "semver"
}
]
}
],
"datePublic": "2024-02-22T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dell Dock Firmware and Dell Client Platform contain an Improper Link Resolution vulnerability during installation resulting in arbitrary folder deletion, which could lead to Privilege Escalation or Denial of Service."
}
],
"value": "Dell Dock Firmware and Dell Client Platform contain an Improper Link Resolution vulnerability during installation resulting in arbitrary folder deletion, which could lead to Privilege Escalation or Denial of Service."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-59",
"description": "CWE-59: Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-28T05:33:16.899Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000217981/dsa-2023-362-security-update-for-dell-dock-firmware-and-dell-client-platform-for-an-improper-link-resolution-vulnerability"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-43078",
"datePublished": "2024-08-28T05:33:16.899Z",
"dateReserved": "2023-09-15T07:02:11.648Z",
"dateUpdated": "2024-08-28T22:31:00.645Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-38483 (GCVE-0-2024-38483)
Vulnerability from nvd – Published: 2024-08-14 09:24 – Updated: 2024-08-15 14:24
VLAI?
Summary
Dell BIOS contains an Improper Input Validation vulnerability in an externally developed component. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Code execution.
Severity ?
5.8 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dell | Dell Client Platform BIOS |
Affected:
N/A , < 1.35.0
(semver)
Affected: N/A , < 2.32.0 (semver) Affected: N/A , < 1.26.0 (semver) |
Credits
CVE-2024-38483: Dell Technologies would like to thank codebreaker1337 for reporting this issue.
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:dell:latitude_5290_2-in-1_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_5290_2-in-1_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.35.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:precision_3420_tower_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "precision_3420_tower_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "2.32.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:precision_3620_tower_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "precision_3620_tower_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "2.32.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:wyse_7040_thin_client_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "wyse_7040_thin_client_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.26.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-38483",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-15T14:19:05.413802Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-08-15T14:24:22.170Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Dell Client Platform BIOS",
"vendor": "Dell",
"versions": [
{
"lessThan": "1.35.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.32.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.26.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "CVE-2024-38483: Dell Technologies would like to thank codebreaker1337 for reporting this issue."
}
],
"datePublic": "2024-08-13T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dell BIOS contains an Improper Input Validation vulnerability in an externally developed component. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Code execution."
}
],
"value": "Dell BIOS contains an Improper Input Validation vulnerability in an externally developed component. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Code execution."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20: Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-14T09:24:10.775Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000225776/dsa-2024-260"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2024-38483",
"datePublished": "2024-08-14T09:24:10.775Z",
"dateReserved": "2024-06-18T01:53:34.136Z",
"dateUpdated": "2024-08-15T14:24:22.170Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-0158 (GCVE-0-2024-0158)
Vulnerability from nvd – Published: 2024-07-02 06:20 – Updated: 2024-08-01 17:41
VLAI?
Summary
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with admin privileges may potentially exploit this vulnerability to modify a UEFI variable, leading to denial of service and escalation of privileges
Severity ?
5.1 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dell | CPG BIOS |
Affected:
N/A , < 1.28.0
(semver)
Affected: N/A , < 1.23.0 (semver) Affected: N/A , < 1.15.0 (semver) Affected: N/A , < 1.2.1 (semver) Affected: N/A , < 1.12.1 (semver) Affected: N/A , < 1.2.0 (semver) Affected: N/A , < 1.20.0 (semver) Affected: N/A , < 1.12.0 (semver) Affected: N/A , < 1.26.0 (semver) Affected: N/A , < 1.27.0 (semver) Affected: N/A , < 1.13.0 (semver) Affected: N/A , < 1.29.0 (semver) Affected: N/A , < 1.19.0 (semver) Affected: N/A , < 1.25.0 (semver) Affected: N/A , < 1.31.0 (semver) Affected: N/A , < 2.27.0 (semver) Affected: N/A , < 2.35.0 (semver) Affected: N/A , < 2.39.0 (semver) Affected: N/A , < 1.17.0 (semver) Affected: N/A , < 1.24.0 (semver) Affected: N/A , < 2.26.0 (semver) Affected: N/A , < 1.13.1 (semver) Affected: N/A , < 2.25.0 (semver) Affected: N/A , < 1.3.1 (semver) Affected: N/A , < 1.18.0 (semver) Affected: N/A , < 1.21.0 (semver) Affected: N/A , < 1.22.0 (semver) Affected: N/A , < 1.9.0 (semver) Affected: N/A , < 1.3.0 (semver) Affected: N/A , < 1.30.0 (semver) Affected: N/A , < 1.32.0 (semver) Affected: N/A , < 1.29..0 (semver) Affected: N/A , < 1.45.0 (semver) Affected: N/A , < 1.33.0 (semver) Affected: N/A , < 1.11.0 (semver) Affected: N/A , < 1.35.0 (semver) Affected: N/A , < 1.34.0 (semver) Affected: N/A , < 1.36.0 (semver) Affected: N/A , < 1.36.2 (semver) Affected: N/A , < 1.25.1 (semver) Affected: N/A , < 1.21.1 (semver) Affected: N/A , < 1.4.1 (semver) Affected: N/A , < 1.49.0 (semver) Affected: N/A , < 1.37.0 (semver) Affected: N/A , < 1.34.2 (semver) Affected: N/A , < 1.30.1 (semver) Affected: N/A , < 1.16.1 (semver) Affected: N/A , < 2.24.0 (semver) Affected: N/A , < 2.18.0 (semver) Affected: N/A , < 1.1.38 (semver) Affected: N/A , < 3.3.2 (semver) Affected: N/A , < 2.29.0 (semver) Affected: N/A , < 2.12.0 (semver) Affected: N/A , < 2.30.0 (semver) Affected: N/A , < 1.30.8 (semver) Affected: N/A , < 1.10.0 (semver) Affected: N/A , < 1.26.1 (semver) Affected: N/A , < 1.1.17 (semver) Affected: N/A , < 1.20.1 (semver) Affected: N/A , < 1.7.0 (semver) Affected: N/A , < 01.03.00 (semver) Affected: N/A , < 1.1.16 (semver) Affected: N/A , < 3.21.0 (semver) Affected: N/A , < 2.23.0 (semver) Affected: N/A , < 1.19.1 (semver) Affected: N/A , < 2.10.0 (semver) Affected: N/A , < 2.18.1 (semver) Affected: N/A , < 1.14.0 (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-0158",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-07-02T14:21:02.955425Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-07-02T14:21:13.009Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T17:41:16.039Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-in/000220141/dsa-2024-030-security-update-for-dell-client-bios-for-an-improper-input-validation-vulnerability"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"lessThan": "1.28.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.23.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.15.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.2.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.12.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.2.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.20.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.12.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.26.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.27.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.13.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.29.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.19.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.25.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.27.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.35.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.39.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.17.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.24.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.26.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.13.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.25.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.3.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.18.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.21.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.22.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.9.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.3.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.30.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.32.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.29..0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.45.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.33.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.11.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.35.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.34.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.36.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.36.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.25.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.21.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.4.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.49.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.37.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.34.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.30.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.16.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.24.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.18.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.1.38",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "3.3.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.29.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.12.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.30.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.30.8",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.10.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.26.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.1.17",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.20.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.7.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "01.03.00",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.1.16",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "3.21.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.23.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.19.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.10.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.18.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.14.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
}
]
}
],
"datePublic": "2024-03-12T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with admin privileges may potentially exploit this vulnerability to modify a UEFI variable, leading to denial of service and escalation of privileges"
}
],
"value": "Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with admin privileges may potentially exploit this vulnerability to modify a UEFI variable, leading to denial of service and escalation of privileges"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20: Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-07-02T06:20:44.735Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-in/000220141/dsa-2024-030-security-update-for-dell-client-bios-for-an-improper-input-validation-vulnerability"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2024-0158",
"datePublished": "2024-07-02T06:20:44.735Z",
"dateReserved": "2023-12-14T05:30:35.591Z",
"dateUpdated": "2024-08-01T17:41:16.039Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-32855 (GCVE-0-2024-32855)
Vulnerability from nvd – Published: 2024-06-25 04:06 – Updated: 2024-08-02 02:20
VLAI?
Summary
Dell Client Platform BIOS contains an Out-of-bounds Write vulnerability in an externally developed component. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Information tampering.
Severity ?
CWE
- CWE-787 - Out-of-bounds Write
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dell | CPG BIOS |
Affected:
N/A , < 1.30.0
(semver)
Affected: N/A , < 1.26.0 (semver) Affected: N/A , < 1.34.0 (semver) Affected: N/A , < 1.28.0 (semver) Affected: N/A , < 1.25.0 (semver) Affected: N/A , < 1.24.0 (semver) Affected: N/A , < 1.31.0 (semver) Affected: N/A , < 1.36.0 (semver) Affected: N/A , < 1.35.0 (semver) Affected: N/A , < 1.29.0 (semver) Affected: N/A , < 1.32.0 (semver) Affected: N/A , < 1.33.0 (semver) Affected: N/A , < 1.50.0 (semver) Affected: N/A , < 1.37.0 (semver) Affected: N/A , < 1.38.0 (semver) Affected: N/A , < 1.31.8 (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-32855",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-06-25T13:13:59.349457Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-25T13:14:05.562Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T02:20:35.676Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000225627/dsa-2024-123"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"lessThan": "1.30.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.26.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.34.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.28.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.25.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.24.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.36.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.35.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.29.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.32.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.33.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.50.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.37.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.38.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.8",
"status": "affected",
"version": "N/A",
"versionType": "semver"
}
]
}
],
"datePublic": "2024-06-24T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dell Client Platform BIOS contains an Out-of-bounds Write vulnerability in an externally developed component. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Information tampering."
}
],
"value": "Dell Client Platform BIOS contains an Out-of-bounds Write vulnerability in an externally developed component. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Information tampering."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.8,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-787",
"description": "CWE-787: Out-of-bounds Write",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-06-25T04:06:39.172Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000225627/dsa-2024-123"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2024-32855",
"datePublished": "2024-06-25T04:06:39.172Z",
"dateReserved": "2024-04-19T09:34:13.526Z",
"dateUpdated": "2024-08-02T02:20:35.676Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-22429 (GCVE-0-2024-22429)
Vulnerability from nvd – Published: 2024-05-17 15:20 – Updated: 2024-08-01 22:43
VLAI?
Summary
Dell BIOS contains an Improper Input Validation vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to arbitrary code execution.
Severity ?
7.5 (High)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dell | CPG BIOS |
Affected:
N/A , < 2.36.0
(semver)
Affected: N/A , < 1.18.0 (semver) Affected: N/A , < 1.46.0 (semver) Affected: N/A , < 1.27.0 (semver) Affected: N/A , < 1.29.0 (semver) Affected: N/A , < 1.28.0 (semver) Affected: N/A , < 1.31.0 (semver) Affected: N/A , < 1.32.0 (semver) Affected: N/A , < 1.50.0 (semver) Affected: N/A , < 2.30.0 (semver) |
Credits
Dell would like to thank schur of BUPT, Dubhe Lab for reporting this issue.
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:dell:edge_gateway_3000_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "edge_gateway_3000_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.18.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:latitude_13_3380:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_13_3380",
"vendor": "dell",
"versions": [
{
"lessThan": "1.27.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_3180_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_3180_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_3189_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_3189_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:latitude_3390_2-in-1:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_3390_2-in-1",
"vendor": "dell",
"versions": [
{
"lessThan": "1.31.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_5414_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_5414_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.46.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:dell:latitude_5424_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_5424_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.32.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_7414_rugged_extreme_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_7414_rugged_extreme_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.46.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:precision_3420_tower:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "precision_3420_tower",
"vendor": "dell",
"versions": [
{
"lessThan": "2.30.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:precision_3620_tower:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "precision_3620_tower",
"vendor": "dell",
"versions": [
{
"lessThan": "2.30.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_5280_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_5280_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "2.36.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_12_rugged_extreme_7214_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_12_rugged_extreme_7214_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.46.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_3300_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_3300_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.28.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:dell:latitude_7212_rugged_extreme_tablet_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_7212_rugged_extreme_tablet_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.50.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:wyse_5070:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "wyse_5070",
"vendor": "dell",
"versions": [
{
"lessThan": "1.31.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-22429",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-05-21T13:54:51.026876Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-06T14:03:23.200Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T22:43:35.008Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000221102/dsa-2024-020"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"lessThan": "2.36.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.18.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.46.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.27.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.29.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.28.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.32.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.50.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.30.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Dell would like to thank schur of BUPT, Dubhe Lab for reporting this issue."
}
],
"datePublic": "2024-05-14T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dell BIOS contains an Improper Input Validation vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to arbitrary code execution."
}
],
"value": "Dell BIOS contains an Improper Input Validation vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to arbitrary code execution."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20: Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-05-17T15:20:16.147Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000221102/dsa-2024-020"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2024-22429",
"datePublished": "2024-05-17T15:20:16.147Z",
"dateReserved": "2024-01-10T15:23:01.337Z",
"dateUpdated": "2024-08-01T22:43:35.008Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-28063 (GCVE-0-2023-28063)
Vulnerability from nvd – Published: 2024-02-06 07:38 – Updated: 2024-08-02 12:30
VLAI?
Summary
Dell BIOS contains a Signed to Unsigned Conversion Error vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to denial of service.
Severity ?
6.7 (Medium)
CWE
- CWE-195 - Signed to Unsigned Conversion Error
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dell | CPG BIOS |
Affected:
1.24.0
Affected: 1.17.0 Affected: 1.13.0 Affected: 1.5.1 Affected: 1.21.0 Affected: 1.20.0 Affected: 1.23.0 Affected: 1.26.0 Affected: 1.25.0 Affected: 1.15.0 Affected: 1.12.0 Affected: 2.20.0 Affected: 1.14.0 Affected: 1.27.0 Affected: 1.19.0 Affected: 1.22.1 Affected: 2.21.0 Affected: 1.18.0 Affected: 1.7.0 Affected: 1.28.0 Affected: 1.22.0 Affected: 1.29.0 Affected: 1.30.0 Affected: 1.11.0 Affected: 1.13.1 Affected: 1.26.1 Affected: 1.13.2 Affected: 1.14.1 Affected: 1.33.0 Affected: 1.31.0 Affected: 1.12.1 Affected: 1.18.1 Affected: 1.10.0 Affected: 2.14.0 Affected: 1.1.28 Affected: 1.4.1 Affected: 2.5.1 Affected: 2.4.0 Affected: 2.6.1 Affected: 1.26.8 Affected: 1.24.1 Affected: 1.17.1 Affected: 1.29.1 Affected: 1.1.0 Affected: 1.16.0 Affected: 3.17.0 Affected: 2.19.0 Affected: 1.8.1 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-28063",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-02-06T17:07:13.502616Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-07-05T17:21:34.998Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T12:30:23.947Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000214780/dsa-2023-176-dell-client-bios-security-update-for-a-signed-to-unsigned-conversion-error-vulnerability"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "1.24.0"
},
{
"status": "affected",
"version": "1.17.0"
},
{
"status": "affected",
"version": "1.13.0"
},
{
"status": "affected",
"version": "1.5.1"
},
{
"status": "affected",
"version": "1.21.0"
},
{
"status": "affected",
"version": "1.20.0"
},
{
"status": "affected",
"version": "1.23.0"
},
{
"status": "affected",
"version": "1.26.0"
},
{
"status": "affected",
"version": "1.25.0"
},
{
"status": "affected",
"version": "1.15.0"
},
{
"status": "affected",
"version": "1.12.0"
},
{
"status": "affected",
"version": "2.20.0"
},
{
"status": "affected",
"version": "1.14.0"
},
{
"status": "affected",
"version": "1.27.0"
},
{
"status": "affected",
"version": "1.19.0"
},
{
"status": "affected",
"version": "1.22.1"
},
{
"status": "affected",
"version": "2.21.0"
},
{
"status": "affected",
"version": "1.18.0"
},
{
"status": "affected",
"version": "1.7.0"
},
{
"status": "affected",
"version": "1.28.0"
},
{
"status": "affected",
"version": "1.22.0"
},
{
"status": "affected",
"version": "1.29.0"
},
{
"status": "affected",
"version": "1.30.0"
},
{
"status": "affected",
"version": "1.11.0"
},
{
"status": "affected",
"version": "1.13.1"
},
{
"status": "affected",
"version": "1.26.1"
},
{
"status": "affected",
"version": "1.13.2"
},
{
"status": "affected",
"version": "1.14.1"
},
{
"status": "affected",
"version": "1.33.0"
},
{
"status": "affected",
"version": "1.31.0"
},
{
"status": "affected",
"version": "1.12.1"
},
{
"status": "affected",
"version": "1.18.1"
},
{
"status": "affected",
"version": "1.10.0"
},
{
"status": "affected",
"version": "2.14.0"
},
{
"status": "affected",
"version": "1.1.28"
},
{
"status": "affected",
"version": "1.4.1"
},
{
"status": "affected",
"version": "2.5.1"
},
{
"status": "affected",
"version": "2.4.0"
},
{
"status": "affected",
"version": "2.6.1"
},
{
"status": "affected",
"version": "1.26.8"
},
{
"status": "affected",
"version": "1.24.1"
},
{
"status": "affected",
"version": "1.17.1"
},
{
"status": "affected",
"version": "1.29.1"
},
{
"status": "affected",
"version": "1.1.0"
},
{
"status": "affected",
"version": "1.16.0"
},
{
"status": "affected",
"version": "3.17.0"
},
{
"status": "affected",
"version": "2.19.0"
},
{
"status": "affected",
"version": "1.8.1"
}
]
}
],
"datePublic": "2023-06-13T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell BIOS contains a Signed to Unsigned Conversion Error vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to denial of service.\u003c/span\u003e\n\n"
}
],
"value": "\nDell BIOS contains a Signed to Unsigned Conversion Error vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to denial of service.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-195",
"description": "CWE-195: Signed to Unsigned Conversion Error",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-02-06T07:38:54.321Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000214780/dsa-2023-176-dell-client-bios-security-update-for-a-signed-to-unsigned-conversion-error-vulnerability"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-28063",
"datePublished": "2024-02-06T07:38:54.321Z",
"dateReserved": "2023-03-10T05:06:06.441Z",
"dateUpdated": "2024-08-02T12:30:23.947Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-28060 (GCVE-0-2023-28060)
Vulnerability from nvd – Published: 2023-06-23 10:17 – Updated: 2024-11-07 21:26
VLAI?
Summary
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
Severity ?
5.1 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T12:30:22.781Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-28060",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-07T21:26:23.822877Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-07T21:26:38.861Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "All Versions"
}
]
}
],
"datePublic": "2023-06-14T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\u003c/span\u003e\n\n"
}
],
"value": "\nDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20: Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-06-23T10:17:46.249Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-28060",
"datePublished": "2023-06-23T10:17:46.249Z",
"dateReserved": "2023-03-10T05:01:55.232Z",
"dateUpdated": "2024-11-07T21:26:38.861Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-28058 (GCVE-0-2023-28058)
Vulnerability from nvd – Published: 2023-06-23 10:30 – Updated: 2024-11-07 21:07
VLAI?
Summary
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
Severity ?
5.1 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T12:30:23.586Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-28058",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-07T21:06:57.836824Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-07T21:07:06.911Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "All Versions"
}
]
}
],
"datePublic": "2023-06-14T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\u003c/span\u003e\n\n"
}
],
"value": "\nDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20: Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-06-23T10:30:27.581Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-28058",
"datePublished": "2023-06-23T10:30:27.581Z",
"dateReserved": "2023-03-10T05:01:55.232Z",
"dateUpdated": "2024-11-07T21:07:06.911Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-28050 (GCVE-0-2023-28050)
Vulnerability from nvd – Published: 2023-06-23 10:25 – Updated: 2024-11-07 21:09
VLAI?
Summary
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
Severity ?
5.1 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T12:30:22.772Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-28050",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-07T21:07:21.607702Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-07T21:09:09.993Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "All Versions"
}
]
}
],
"datePublic": "2023-06-14T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\u003c/span\u003e\n\n"
}
],
"value": "\nDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20: Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-06-23T10:25:56.877Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-28050",
"datePublished": "2023-06-23T10:25:56.877Z",
"dateReserved": "2023-03-10T05:01:43.871Z",
"dateUpdated": "2024-11-07T21:09:09.993Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-28044 (GCVE-0-2023-28044)
Vulnerability from nvd – Published: 2023-06-23 10:20 – Updated: 2024-11-07 21:09
VLAI?
Summary
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
Severity ?
5.1 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T12:30:22.690Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-28044",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-07T21:09:18.405245Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-07T21:09:31.489Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "All Versions"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\u003c/span\u003e\n\n"
}
],
"value": "\nDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20: Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-06-23T10:20:01.132Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-28044",
"datePublished": "2023-06-23T10:20:01.132Z",
"dateReserved": "2023-03-10T04:59:39.426Z",
"dateUpdated": "2024-11-07T21:09:31.489Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-28036 (GCVE-0-2023-28036)
Vulnerability from nvd – Published: 2023-06-23 10:01 – Updated: 2024-11-08 14:08
VLAI?
Summary
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
Severity ?
5.1 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T12:23:30.885Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-28036",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-08T14:00:35.226875Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-08T14:08:38.079Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "All Versions"
}
]
}
],
"datePublic": "2023-06-14T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\u003c/span\u003e\n\n"
}
],
"value": "\nDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20: Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-06-23T10:02:03.689Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-28036",
"datePublished": "2023-06-23T10:01:57.598Z",
"dateReserved": "2023-03-10T04:59:39.425Z",
"dateUpdated": "2024-11-08T14:08:38.079Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-28034 (GCVE-0-2023-28034)
Vulnerability from nvd – Published: 2023-06-23 10:08 – Updated: 2024-11-07 21:47
VLAI?
Summary
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
Severity ?
5.1 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T12:23:30.888Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-28034",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-07T21:47:05.414975Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-07T21:47:18.534Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "All Versions"
}
]
}
],
"datePublic": "2023-06-14T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\u003c/span\u003e\n\n"
}
],
"value": "\nDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20: Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-06-23T10:08:23.429Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-28034",
"datePublished": "2023-06-23T10:08:23.429Z",
"dateReserved": "2023-03-10T04:57:40.871Z",
"dateUpdated": "2024-11-07T21:47:18.534Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-28031 (GCVE-0-2023-28031)
Vulnerability from nvd – Published: 2023-06-23 10:11 – Updated: 2024-11-07 21:36
VLAI?
Summary
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
Severity ?
5.1 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T12:23:30.885Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-28031",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-07T21:32:31.275061Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-07T21:36:15.086Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "All Versions"
}
]
}
],
"datePublic": "2023-06-14T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\u003c/span\u003e\n\n"
}
],
"value": "\nDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20: Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-06-23T10:11:12.555Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-28031",
"datePublished": "2023-06-23T10:11:12.555Z",
"dateReserved": "2023-03-10T04:57:40.871Z",
"dateUpdated": "2024-11-07T21:36:15.086Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-28027 (GCVE-0-2023-28027)
Vulnerability from nvd – Published: 2023-06-23 10:04 – Updated: 2024-11-08 14:08
VLAI?
Summary
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
Severity ?
5.1 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T12:23:30.799Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-28027",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-08T14:00:31.033659Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-08T14:08:55.284Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "All Versions"
}
]
}
],
"datePublic": "2023-06-14T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\u003c/span\u003e\n\n"
}
],
"value": "\nDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20: Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-06-23T10:04:42.451Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-28027",
"datePublished": "2023-06-23T10:04:42.451Z",
"dateReserved": "2023-03-10T04:57:40.870Z",
"dateUpdated": "2024-11-08T14:08:55.284Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-28026 (GCVE-0-2023-28026)
Vulnerability from nvd – Published: 2023-06-23 10:23 – Updated: 2024-12-04 14:43
VLAI?
Summary
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
Severity ?
5.1 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T12:23:30.812Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-28026",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-12-04T14:43:48.808973Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-12-04T14:43:58.513Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "All Versions"
}
]
}
],
"datePublic": "2023-06-14T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\u003c/span\u003e\n\n"
}
],
"value": "\nDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20: Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-06-23T10:23:05.908Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-28026",
"datePublished": "2023-06-23T10:23:05.908Z",
"dateReserved": "2023-03-10T04:57:40.870Z",
"dateUpdated": "2024-12-04T14:43:58.513Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-25938 (GCVE-0-2023-25938)
Vulnerability from nvd – Published: 2023-06-23 10:13 – Updated: 2024-11-07 21:31
VLAI?
Summary
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
Severity ?
5.1 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T11:39:06.884Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-25938",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-07T21:31:27.802986Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-07T21:31:46.930Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "All Versions"
}
]
}
],
"datePublic": "2023-06-14T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\u003c/span\u003e\n\n"
}
],
"value": "\nDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20: Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-06-23T10:13:31.571Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-25938",
"datePublished": "2023-06-23T10:13:31.571Z",
"dateReserved": "2023-02-17T06:15:08.303Z",
"dateUpdated": "2024-11-07T21:31:46.930Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-28061 (GCVE-0-2023-28061)
Vulnerability from nvd – Published: 2023-06-23 09:19 – Updated: 2024-11-08 16:51
VLAI?
Summary
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
Severity ?
5.1 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T12:30:22.777Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-28061",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-08T16:50:16.282690Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-08T16:51:02.127Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "All Versions"
}
]
}
],
"datePublic": "2023-06-14T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\u003c/span\u003e\n\n"
}
],
"value": "\nDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20: Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-06-23T09:19:23.540Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-28061",
"datePublished": "2023-06-23T09:19:23.540Z",
"dateReserved": "2023-03-10T05:06:06.441Z",
"dateUpdated": "2024-11-08T16:51:02.127Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-52541 (GCVE-0-2024-52541)
Vulnerability from cvelistv5 – Published: 2025-02-19 16:46 – Updated: 2025-02-19 17:08
VLAI?
Summary
Dell Client Platform BIOS contains a Weak Authentication vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.
Severity ?
8.2 (High)
CWE
- CWE-1390 - Weak Authentication
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dell | Dell Client Platform BIOS |
Affected:
N/A , < 1.34.0
(semver)
Affected: N/A , < 1.28.0 (semver) Affected: N/A , < 1.21.0 (semver) Affected: N/A , < 1.8.0 (semver) Affected: N/A , < 1.9.0 (semver) Affected: N/A , < 1.17.0 (semver) Affected: N/A , < 1.7.0 (semver) Affected: N/A , < 1.26.0 (semver) Affected: N/A , < 1.20.0 (semver) Affected: N/A , < 1.31.1 (semver) Affected: N/A , < 1.30.0 (semver) Affected: N/A , < 1.29.0 (semver) Affected: N/A , < 1.32.0 (semver) Affected: N/A , < 1.21.1 (semver) Affected: N/A , < 1.25.1 (semver) Affected: N/A , < 1.33.0 (semver) Affected: N/A , < 1.31.0 (semver) Affected: N/A , < 2.31.0 (semver) Affected: N/A , < 2.39.0 (semver) Affected: N/A , < 2.43.0 (semver) Affected: N/A , < 1.27.0 (semver) Affected: N/A , < 1.22.0 (semver) Affected: N/A , < 1.18.0 (semver) Affected: N/A , < 2.30.0 (semver) Affected: N/A , < 1.24.0 (semver) Affected: N/A , < 1.25.0 (semver) Affected: N/A , < 1.10.0 (semver) Affected: N/A , < 1.14.0 (semver) Affected: N/A , < 1.6.1 (semver) Affected: N/A , < 1.15.1 (semver) Affected: N/A , < 1.36.1 (semver) Affected: N/A , < 1.33.1 (semver) Affected: N/A , < 1.48.0 (semver) Affected: N/A , < 1.37.0 (semver) Affected: N/A , < 1.27.1 (semver) Affected: N/A , < 1.26.1 (semver) Affected: N/A , < 1.16.0 (semver) Affected: N/A , < 1.35.1 (semver) Affected: N/A , < 1.32.1 (semver) Affected: N/A , < 1.38.0 (semver) Affected: N/A , < 1.40.0 (semver) Affected: N/A , < 1.35.0 (semver) Affected: N/A , < 1.36.0 (semver) Affected: N/A , < 1.41.0 (semver) Affected: N/A , < 1.31.2 (semver) Affected: N/A , < 1.18.1 (semver) Affected: N/A , < 1.39.0 (semver) Affected: N/A , < 1.53.0 (semver) Affected: N/A , < 1.19.1 (semver) Affected: N/A , < 1.38.1 (semver) Affected: N/A , < 1.7.1 (semver) Affected: N/A , < 1.8.1 (semver) Affected: N/A , < 1.23.0 (semver) Affected: N/A , < 1.34.1 (semver) Affected: N/A , < 1.23.2 (semver) Affected: N/A , < 1.30.1 (semver) Affected: N/A , < 2.28.1 (semver) Affected: N/A , < 2.22.1 (semver) Affected: N/A , < 1.28.1 (semver) Affected: N/A , < 1.1.44 (semver) Affected: N/A , < 3.10.0 (semver) Affected: N/A , < 1.6.0 (semver) Affected: N/A , < 2.33.0 (semver) Affected: N/A , < 2.20.0 (semver) Affected: N/A , < 2.34.0 (semver) Affected: N/A , < 1.15.0 (semver) Affected: N/A , < 1.34.8 (semver) Affected: N/A , < 1.9.1 (semver) Affected: N/A , < 2.6.1 (semver) Affected: N/A , < 01.11.02 (semver) Affected: N/A , < 2.31.1 (semver) Affected: N/A , < 3.27.1 (semver) Affected: N/A , < 2.29.1 (semver) Affected: N/A , < 2.18.1 (semver) Affected: N/A , < 1.13.0 (semver) Affected: N/A , < 1.11.0 (semver) Affected: N/A , < 1.11.1 (semver) Affected: N/A , < 2.24.1 (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-52541",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-19T17:07:39.827843Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-02-19T17:08:48.094Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"modules": [
"Alienware m15 R6",
"Alienware m15 R7",
"Alienware m16 R1",
"Alienware m16 R2",
"Alienware M18 R2",
"Alienware x14 R2",
"Alienware X16 R2",
"ChengMing 3900",
"ChengMing 3910/3911",
"ChengMing 3990",
"Dell Edge Gateway 5000",
"Dell G15 5510",
"Dell G15 5511",
"Dell G15 5530",
"Dell G5 5000",
"Dell Precision 3430 Tower",
"Dell Precision 3431 Tower",
"Dell Precision 3630 Tower",
"Dell Precision 5820 Tower",
"Dell Precision 7820 Tower",
"Embedded Box PC 5000",
"Inspiron 13 5320",
"Inspiron 13 5330",
"Inspiron 14\u00a0 5410/5418",
"Inspiron 14 5420",
"Inspiron 14 Plus 7420",
"Inspiron 14 Plus 7440",
"Inspiron 15 3530",
"Inspiron 16 5640",
"Inspiron 24 5420 All-in-One",
"Inspiron 5301",
"Inspiron 5400/5401",
"Latitude 12 Rugged Extreme 7214",
"Latitude 3190",
"Latitude 3310",
"Latitude 3310 2-In-1",
"Latitude 3340",
"Latitude 3400",
"Latitude 3410",
"Latitude 3420",
"Latitude 5320",
"Latitude 5400",
"Latitude 5401",
"Latitude 5420",
"Latitude 5430 Rugged Laptop",
"Latitude 5440",
"Latitude 5480",
"Latitude 7212 Rugged Extreme Tablet",
"Latitude 7230 Rugged Extreme",
"Latitude 7320",
"Latitude 7350 Detachable",
"Latitude 7450",
"Latitude 9330",
"Latitude 9420",
"OptiPlex 3000 Thin Client",
"OptiPlex 3070",
"OptiPlex 3080",
"OptiPlex 3090",
"OptiPlex 5080",
"OptiPlex 5400 All-In-One",
"Precision 3260 XE Compact / Precision 3260 Compact",
"Precision 3280 CFF",
"Precision 3420 Tower",
"Precision 3660",
"Precision 3930 Rack",
"Precision 5480",
"Precision 5530 2-In-1",
"Precision 5690",
"Precision 5860 Tower",
"Precision 7875 Tower",
"Vostro 3681",
"XPS 13 9310",
"XPS 13 9310 2-in-1",
"XPS 13 Plus 9320",
"XPS 13 9340",
"XPS 14 9440",
"XPS 16 9640",
"XPS 8940"
],
"product": "Dell Client Platform BIOS",
"vendor": "Dell",
"versions": [
{
"lessThan": "1.34.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.28.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.21.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.8.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.9.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.17.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.7.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.26.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.20.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.30.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.29.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.32.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.21.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.25.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.33.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.31.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.39.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.43.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.27.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.22.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.18.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.30.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.24.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.25.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.10.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.14.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.6.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.15.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.36.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.33.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.48.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.37.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.27.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.26.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.16.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.35.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.32.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.38.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.40.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.35.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.36.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.41.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.18.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.39.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.53.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.19.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.38.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.7.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.8.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.23.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.34.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.23.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.30.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.28.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.22.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.28.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.1.44",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "3.10.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.6.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.33.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.20.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.34.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.15.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.34.8",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.9.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.6.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "01.11.02",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.31.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "3.27.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.29.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.18.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.13.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.11.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.11.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.24.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
}
]
}
],
"datePublic": "2025-02-17T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dell Client Platform BIOS contains a Weak Authentication vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.\u003cbr\u003e"
}
],
"value": "Dell Client Platform BIOS contains a Weak Authentication vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-1390",
"description": "CWE-1390: Weak Authentication",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-02-19T16:46:22.803Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000258429/dsa-2025-021"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2024-52541",
"datePublished": "2025-02-19T16:46:22.803Z",
"dateReserved": "2024-11-12T06:04:07.776Z",
"dateUpdated": "2025-02-19T17:08:48.094Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-43078 (GCVE-0-2023-43078)
Vulnerability from cvelistv5 – Published: 2024-08-28 05:33 – Updated: 2024-08-28 22:31
VLAI?
Summary
Dell Dock Firmware and Dell Client Platform contain an Improper Link Resolution vulnerability during installation resulting in arbitrary folder deletion, which could lead to Privilege Escalation or Denial of Service.
Severity ?
6.7 (Medium)
CWE
- CWE-59 - Improper Link Resolution Before File Access ('Link Following')
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dell | Dell Client Platform, Dell Dock Firmware |
Affected:
N/A , < 1.27.0
(semver)
Affected: N/A , < 1.22.0 (semver) Affected: N/A , < 1.14.1 (semver) Affected: N/A , < 1.11.0 (semver) Affected: N/A , < 1.19.0 (semver) Affected: N/A , < 1.20.0 (semver) Affected: N/A , < 1.24.0 (semver) Affected: N/A , < 1.26.0 (semver) Affected: N/A , < 1.12.0 (semver) Affected: N/A , < 1.28.0 (semver) Affected: N/A , < 1.17.0 (semver) Affected: N/A , < 1.23.0 (semver) Affected: N/A , < 1.30.0 (semver) Affected: N/A , < 2.25.0 (semver) Affected: N/A , < 1.16.0 (semver) Affected: N/A , < 1.12.1 (semver) Affected: N/A , < 2.24.0 (semver) Affected: N/A , < 1.8.0 (semver) Affected: N/A , < 1.18.0 (semver) Affected: N/A , < 1.29.0 (semver) Affected: N/A , < 1.24.1 (semver) Affected: N/A , < 1.22.1 (semver) Affected: N/A , < 1.31.0 (semver) Affected: N/A , < 1.25.0 (semver) Affected: N/A , < 1.10.0 (semver) Affected: N/A , < 1.34.0 (semver) Affected: N/A , < 1.32.0 (semver) Affected: N/A , < 1.36.0 (semver) Affected: N/A , < 1.10.1 (semver) Affected: N/A , < 1.36.2 (semver) Affected: N/A , < 1.21.1 (semver) Affected: N/A , < 1.33.0 (semver) Affected: N/A , < 1.35.0 (semver) Affected: N/A , < 1.34.2 (semver) Affected: N/A , < 1.30.1 (semver) Affected: N/A , < 1.15.0 (semver) Affected: N/A , < 2.22.0 (semver) Affected: N/A , < 2.16.0 (semver) Affected: N/A , < 1.22.2 (semver) Affected: N/A , < 1.1.37 (semver) Affected: N/A , < 1.27.1 (semver) Affected: N/A , < 3.3.2 (semver) Affected: N/A , < 1.28.1 (semver) Affected: N/A , < 2.11.1 (semver) Affected: N/A , < 2.28.0 (semver) Affected: N/A , < 1.28.8 (semver) Affected: N/A , < 1.1.16 (semver) Affected: N/A , < 1.20.1 (semver) Affected: N/A , < 1.9.0 (semver) Affected: N/A , < 1.6.1 (semver) Affected: N/A , < 1.1.15 (semver) Affected: N/A , < 2.23.0 (semver) Affected: N/A , < 3.20.0 (semver) Affected: N/A , < 1.19.1 (semver) Affected: N/A , < 2.9.0 (semver) Affected: N/A , < 1.13.0 (semver) Affected: N/A , < 1.0.14.20 (semver) Affected: N/A , < 01.00.15 (semver) Affected: N/A , < 01.00.36 (semver) Affected: N/A , < 4.62.156.006 (semver) Affected: N/A , < 4.66.128.015 (semver) Affected: N/A , < 4.65.111.022 (semver) Affected: N/A , < 4.61.124.014 (semver) Affected: N/A , < 4.46.147.004 (semver) Affected: N/A , < 4.46.134.013 (semver) Affected: N/A , < 4.66.131.016 (semver) Affected: N/A , < 4.46.135.009 (semver) Affected: N/A , < 4.65.162.003 (semver) Affected: N/A , < 4.65.119.017 (semver) Affected: N/A , < 4.62.140.014 (semver) Affected: N/A , < 4.46.166.001 (semver) Affected: N/A , < 4.65.163.002 (semver) Affected: N/A , < 4.62.139.013 (semver) Affected: N/A , < 4.46.112.015 (semver) Affected: N/A , < 4.65.116.019 (semver) Affected: N/A , < 4.46.143.009 (semver) Affected: N/A , < 4.46.145.004 (semver) Affected: N/A , < 4.65.117.031 (semver) Affected: N/A , < 4.62.102.024 (semver) Affected: N/A , < 4.65.108.018 (semver) Affected: N/A , < 4.69.120.013 (semver) Affected: N/A , < 4.46.106.031 (semver) Affected: N/A , < 7.2.2.0 (semver) Affected: N/A , < 74.64 (semver) |
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:dell:wyse_5070_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3480_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3580_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3583_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3540_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3561_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7560_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7760_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7780_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7480_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5480_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_9420_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5521_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3320_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3580_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3480_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_m15_r6_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "alienware_m15_r6_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.27.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_17_9720_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:xps_13_9300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:wyse_5470_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_14_3420_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_15_3520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5570_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5080_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7070_ultra_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3120_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3310_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5310_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5310_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_15_3520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g16_7620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g15_5510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g15_5520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_m15_r7_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "alienware_m15_r7_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.22.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:alienware_m18_r1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_m16_r1_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "alienware_m16_r1_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.14.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:vostro_16_5630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3020_small_desktop_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3020_tower_desktop_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3480_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_all-in-one_7410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_micro_7010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_micro_plus_7010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_small_form_factor_7010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_small_form_factor_plus_7010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_tower_7010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_tower_plus_7010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5440_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7340_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7440_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3020_desktop_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3020_small_desktop_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_16_5630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_16_7630_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_14_5430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_14_7430_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:chengming_3911_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:chengming_3910_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_x16_r1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_x14_r2_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "alienware_x14_r2_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.11.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_13_9305_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3910_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_5620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3470_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5470_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_xe4_tower_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7000_micro_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7000_small_form_factor_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7000_tower_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7000_xe_micro_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5000_micro_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5000_small_form_factor_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5000_tower_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3000_micro_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3000_small_form_factor_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3000_tower_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3330_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5330_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5431_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3910_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_16_5620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_14_5420_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:chengming_3900_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "chengming_3900_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.19.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_15_9520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_15_7510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3471_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3671_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_7620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3571_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5570_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5531_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7330_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7530_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_9430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3671_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3471_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_16_plus_7620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_16_7610_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_15_7510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_14_plus_7420_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:chengming_3988_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "chengming_3988_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.20.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_17_9710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_5090_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5760_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3070_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5070_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7070_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7071_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_9510_2in1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7700_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5401_aio_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5401_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:chengming_3990_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:chengming_3991_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "chengming_3991_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.24.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_15_9500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_7500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3590_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_15_3510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3280_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5270_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7470_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7770_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7310_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7210_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7200_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5421_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7501_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_15_3511_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g15_5511_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "g15_5511_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.26.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_7230_rugged_extreme_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3140_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_16_plus_7630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_14_plus_7430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g16_7630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g15_5530_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "g15_5530_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.12.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_17_9700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3401_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3501_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_5402_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_5502_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3541_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_xe3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7060_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5060_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3060_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5401_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5501_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7320_detachable_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3501_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5402_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5406_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5409_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5502_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5509_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7306_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7506_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7706_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3430_tower_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g5_5500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g3_3500_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "g3_3500_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.28.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_9330_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_16_7620_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_14_7420_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g5_5000_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "g5_5000_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.17.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_13_7390_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:wyse_5470_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_5880_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3240_compact_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3440_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7080_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7330_rugged_laptop_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5430_rugged_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3310_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3431_tower_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g5_5090_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "g5_5090_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.23.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:precision_3530_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7760_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7460_all_in_one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5260_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5491_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5591_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:dell_g7_7500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:dell_g7_7700_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "dell_g7_7700_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.30.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:vostro_13_5310_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_13_5310_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3630_tower_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "precision_3630_tower_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "2.25.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:vostro_5320_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3530_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_13_5320_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_13_5320_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.16.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:inspiron_13_5330_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_13_5330_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.12.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:vostro_15_5510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_14_5410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_15_5510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_15_5518_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_14_5418_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_14_5410_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_14_5410_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "2.24.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:vostro_14_3430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_15_3530_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5480_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_9440_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_27_7720_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_24_5420_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_15_3530_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_15_3530_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.8.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:inspiron_27_7710_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_24_5410_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_24_5411_all-in-one_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_24_5411_all-in-one_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.18.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_13_7390_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7740_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7540_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7424_rugged_extreme_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5420_rugged_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5424_rugged_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5300_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3301_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5593_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3793_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3593_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_3593_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:inspiron_3881_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3880_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_3880_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.24.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:vostro_5890_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3890_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3690_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3891_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_3891_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.22.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:vostro_5301_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7730_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7530_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5290_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3190_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3190_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5301_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_5301_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.31.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_15_7590_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:xps_15_9510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5560_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5540_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3551_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7090_ultra_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3090_ultra_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_9410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7400_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5511_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5411_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3300_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_3300_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.25.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_15_9530_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5680_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3540_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3440_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3340_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_3340_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.10.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:precision_5530_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3420_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_3420_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.34.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_5590_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5290_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_5290_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.32.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:precision_3560_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5320_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_5320_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.36.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:precision_3580_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3581_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5540_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5340_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_5340_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.10.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_5420_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_5420_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.36.2",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:precision_3570_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5530_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_5530_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.21.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_rugged_7220_extreme_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7220_rugged_extreme_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_7220_rugged_extreme_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.33.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_7490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7390_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7290_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_7290_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.35.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_7520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7420_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7320_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_7320_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.34.2",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_9520_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_9520_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.30.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:optiplex_3000_thin_client_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "optiplex_3000_thin_client_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.15.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_13_9310_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3080_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "optiplex_3080_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "2.22.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_8940_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3090_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "optiplex_3090_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "2.16.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:optiplex_7090_tower_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5090_micro_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5090_small_form_factor_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5090_tower_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "optiplex_5090_tower_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.22.2",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:optiplex_7400_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5400_all-in-one_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "optiplex_5400_all-in-one_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.1.37",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:optiplex_7490_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5490_all-in-one_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "optiplex_5490_all-in-one_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.27.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:precision_3460_small_form_factor_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3460_xe_small_form_factor_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3260_compact_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3260_xe_compact_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "precision_3260_xe_compact_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "3.3.2",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:precision_3650_tower_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "precision_3650_tower_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.28.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:precision_3660_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "precision_3660_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "2.11.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-43078",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-28T14:17:19.963412Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-08-28T22:31:00.645Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Dell Client Platform, Dell Dock Firmware",
"vendor": "Dell",
"versions": [
{
"lessThan": "1.27.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.22.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.14.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.11.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.19.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.20.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.24.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.26.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.12.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.28.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.17.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.23.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.30.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.25.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.16.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.12.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.24.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.8.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.18.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.29.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.24.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.22.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.25.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.10.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.34.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.32.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.36.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.10.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.36.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.21.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.33.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.35.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.34.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.30.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.15.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.22.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.16.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.22.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.1.37",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.27.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "3.3.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.28.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.11.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.28.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.28.8",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.1.16",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.20.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.9.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.6.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.1.15",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.23.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "3.20.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.19.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.9.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.13.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.0.14.20",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "01.00.15",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "01.00.36",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.62.156.006",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.66.128.015",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.65.111.022",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.61.124.014",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.46.147.004",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.46.134.013",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.66.131.016",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.46.135.009",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.65.162.003",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.65.119.017",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.62.140.014",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.46.166.001",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.65.163.002",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.62.139.013",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.46.112.015",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.65.116.019",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.46.143.009",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.46.145.004",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.65.117.031",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.62.102.024",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.65.108.018",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.69.120.013",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.46.106.031",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "7.2.2.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "74.64",
"status": "affected",
"version": "N/A",
"versionType": "semver"
}
]
}
],
"datePublic": "2024-02-22T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dell Dock Firmware and Dell Client Platform contain an Improper Link Resolution vulnerability during installation resulting in arbitrary folder deletion, which could lead to Privilege Escalation or Denial of Service."
}
],
"value": "Dell Dock Firmware and Dell Client Platform contain an Improper Link Resolution vulnerability during installation resulting in arbitrary folder deletion, which could lead to Privilege Escalation or Denial of Service."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-59",
"description": "CWE-59: Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-28T05:33:16.899Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000217981/dsa-2023-362-security-update-for-dell-dock-firmware-and-dell-client-platform-for-an-improper-link-resolution-vulnerability"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-43078",
"datePublished": "2024-08-28T05:33:16.899Z",
"dateReserved": "2023-09-15T07:02:11.648Z",
"dateUpdated": "2024-08-28T22:31:00.645Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-38483 (GCVE-0-2024-38483)
Vulnerability from cvelistv5 – Published: 2024-08-14 09:24 – Updated: 2024-08-15 14:24
VLAI?
Summary
Dell BIOS contains an Improper Input Validation vulnerability in an externally developed component. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Code execution.
Severity ?
5.8 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dell | Dell Client Platform BIOS |
Affected:
N/A , < 1.35.0
(semver)
Affected: N/A , < 2.32.0 (semver) Affected: N/A , < 1.26.0 (semver) |
Credits
CVE-2024-38483: Dell Technologies would like to thank codebreaker1337 for reporting this issue.
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:dell:latitude_5290_2-in-1_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_5290_2-in-1_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.35.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:precision_3420_tower_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "precision_3420_tower_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "2.32.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:precision_3620_tower_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "precision_3620_tower_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "2.32.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:wyse_7040_thin_client_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "wyse_7040_thin_client_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.26.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-38483",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-15T14:19:05.413802Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-08-15T14:24:22.170Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Dell Client Platform BIOS",
"vendor": "Dell",
"versions": [
{
"lessThan": "1.35.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.32.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.26.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "CVE-2024-38483: Dell Technologies would like to thank codebreaker1337 for reporting this issue."
}
],
"datePublic": "2024-08-13T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dell BIOS contains an Improper Input Validation vulnerability in an externally developed component. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Code execution."
}
],
"value": "Dell BIOS contains an Improper Input Validation vulnerability in an externally developed component. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Code execution."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20: Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-14T09:24:10.775Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000225776/dsa-2024-260"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2024-38483",
"datePublished": "2024-08-14T09:24:10.775Z",
"dateReserved": "2024-06-18T01:53:34.136Z",
"dateUpdated": "2024-08-15T14:24:22.170Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-0158 (GCVE-0-2024-0158)
Vulnerability from cvelistv5 – Published: 2024-07-02 06:20 – Updated: 2024-08-01 17:41
VLAI?
Summary
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with admin privileges may potentially exploit this vulnerability to modify a UEFI variable, leading to denial of service and escalation of privileges
Severity ?
5.1 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dell | CPG BIOS |
Affected:
N/A , < 1.28.0
(semver)
Affected: N/A , < 1.23.0 (semver) Affected: N/A , < 1.15.0 (semver) Affected: N/A , < 1.2.1 (semver) Affected: N/A , < 1.12.1 (semver) Affected: N/A , < 1.2.0 (semver) Affected: N/A , < 1.20.0 (semver) Affected: N/A , < 1.12.0 (semver) Affected: N/A , < 1.26.0 (semver) Affected: N/A , < 1.27.0 (semver) Affected: N/A , < 1.13.0 (semver) Affected: N/A , < 1.29.0 (semver) Affected: N/A , < 1.19.0 (semver) Affected: N/A , < 1.25.0 (semver) Affected: N/A , < 1.31.0 (semver) Affected: N/A , < 2.27.0 (semver) Affected: N/A , < 2.35.0 (semver) Affected: N/A , < 2.39.0 (semver) Affected: N/A , < 1.17.0 (semver) Affected: N/A , < 1.24.0 (semver) Affected: N/A , < 2.26.0 (semver) Affected: N/A , < 1.13.1 (semver) Affected: N/A , < 2.25.0 (semver) Affected: N/A , < 1.3.1 (semver) Affected: N/A , < 1.18.0 (semver) Affected: N/A , < 1.21.0 (semver) Affected: N/A , < 1.22.0 (semver) Affected: N/A , < 1.9.0 (semver) Affected: N/A , < 1.3.0 (semver) Affected: N/A , < 1.30.0 (semver) Affected: N/A , < 1.32.0 (semver) Affected: N/A , < 1.29..0 (semver) Affected: N/A , < 1.45.0 (semver) Affected: N/A , < 1.33.0 (semver) Affected: N/A , < 1.11.0 (semver) Affected: N/A , < 1.35.0 (semver) Affected: N/A , < 1.34.0 (semver) Affected: N/A , < 1.36.0 (semver) Affected: N/A , < 1.36.2 (semver) Affected: N/A , < 1.25.1 (semver) Affected: N/A , < 1.21.1 (semver) Affected: N/A , < 1.4.1 (semver) Affected: N/A , < 1.49.0 (semver) Affected: N/A , < 1.37.0 (semver) Affected: N/A , < 1.34.2 (semver) Affected: N/A , < 1.30.1 (semver) Affected: N/A , < 1.16.1 (semver) Affected: N/A , < 2.24.0 (semver) Affected: N/A , < 2.18.0 (semver) Affected: N/A , < 1.1.38 (semver) Affected: N/A , < 3.3.2 (semver) Affected: N/A , < 2.29.0 (semver) Affected: N/A , < 2.12.0 (semver) Affected: N/A , < 2.30.0 (semver) Affected: N/A , < 1.30.8 (semver) Affected: N/A , < 1.10.0 (semver) Affected: N/A , < 1.26.1 (semver) Affected: N/A , < 1.1.17 (semver) Affected: N/A , < 1.20.1 (semver) Affected: N/A , < 1.7.0 (semver) Affected: N/A , < 01.03.00 (semver) Affected: N/A , < 1.1.16 (semver) Affected: N/A , < 3.21.0 (semver) Affected: N/A , < 2.23.0 (semver) Affected: N/A , < 1.19.1 (semver) Affected: N/A , < 2.10.0 (semver) Affected: N/A , < 2.18.1 (semver) Affected: N/A , < 1.14.0 (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-0158",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-07-02T14:21:02.955425Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-07-02T14:21:13.009Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T17:41:16.039Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-in/000220141/dsa-2024-030-security-update-for-dell-client-bios-for-an-improper-input-validation-vulnerability"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"lessThan": "1.28.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.23.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.15.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.2.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.12.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.2.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.20.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.12.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.26.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.27.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.13.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.29.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.19.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.25.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.27.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.35.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.39.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.17.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.24.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.26.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.13.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.25.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.3.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.18.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.21.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.22.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.9.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.3.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.30.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.32.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.29..0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.45.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.33.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.11.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.35.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.34.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.36.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.36.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.25.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.21.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.4.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.49.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.37.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.34.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.30.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.16.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.24.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.18.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.1.38",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "3.3.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.29.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.12.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.30.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.30.8",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.10.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.26.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.1.17",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.20.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.7.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "01.03.00",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.1.16",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "3.21.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.23.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.19.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.10.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.18.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.14.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
}
]
}
],
"datePublic": "2024-03-12T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with admin privileges may potentially exploit this vulnerability to modify a UEFI variable, leading to denial of service and escalation of privileges"
}
],
"value": "Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with admin privileges may potentially exploit this vulnerability to modify a UEFI variable, leading to denial of service and escalation of privileges"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20: Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-07-02T06:20:44.735Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-in/000220141/dsa-2024-030-security-update-for-dell-client-bios-for-an-improper-input-validation-vulnerability"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2024-0158",
"datePublished": "2024-07-02T06:20:44.735Z",
"dateReserved": "2023-12-14T05:30:35.591Z",
"dateUpdated": "2024-08-01T17:41:16.039Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-32855 (GCVE-0-2024-32855)
Vulnerability from cvelistv5 – Published: 2024-06-25 04:06 – Updated: 2024-08-02 02:20
VLAI?
Summary
Dell Client Platform BIOS contains an Out-of-bounds Write vulnerability in an externally developed component. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Information tampering.
Severity ?
CWE
- CWE-787 - Out-of-bounds Write
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dell | CPG BIOS |
Affected:
N/A , < 1.30.0
(semver)
Affected: N/A , < 1.26.0 (semver) Affected: N/A , < 1.34.0 (semver) Affected: N/A , < 1.28.0 (semver) Affected: N/A , < 1.25.0 (semver) Affected: N/A , < 1.24.0 (semver) Affected: N/A , < 1.31.0 (semver) Affected: N/A , < 1.36.0 (semver) Affected: N/A , < 1.35.0 (semver) Affected: N/A , < 1.29.0 (semver) Affected: N/A , < 1.32.0 (semver) Affected: N/A , < 1.33.0 (semver) Affected: N/A , < 1.50.0 (semver) Affected: N/A , < 1.37.0 (semver) Affected: N/A , < 1.38.0 (semver) Affected: N/A , < 1.31.8 (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-32855",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-06-25T13:13:59.349457Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-25T13:14:05.562Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T02:20:35.676Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000225627/dsa-2024-123"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"lessThan": "1.30.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.26.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.34.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.28.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.25.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.24.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.36.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.35.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.29.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.32.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.33.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.50.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.37.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.38.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.8",
"status": "affected",
"version": "N/A",
"versionType": "semver"
}
]
}
],
"datePublic": "2024-06-24T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dell Client Platform BIOS contains an Out-of-bounds Write vulnerability in an externally developed component. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Information tampering."
}
],
"value": "Dell Client Platform BIOS contains an Out-of-bounds Write vulnerability in an externally developed component. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Information tampering."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.8,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-787",
"description": "CWE-787: Out-of-bounds Write",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-06-25T04:06:39.172Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000225627/dsa-2024-123"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2024-32855",
"datePublished": "2024-06-25T04:06:39.172Z",
"dateReserved": "2024-04-19T09:34:13.526Z",
"dateUpdated": "2024-08-02T02:20:35.676Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-22429 (GCVE-0-2024-22429)
Vulnerability from cvelistv5 – Published: 2024-05-17 15:20 – Updated: 2024-08-01 22:43
VLAI?
Summary
Dell BIOS contains an Improper Input Validation vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to arbitrary code execution.
Severity ?
7.5 (High)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dell | CPG BIOS |
Affected:
N/A , < 2.36.0
(semver)
Affected: N/A , < 1.18.0 (semver) Affected: N/A , < 1.46.0 (semver) Affected: N/A , < 1.27.0 (semver) Affected: N/A , < 1.29.0 (semver) Affected: N/A , < 1.28.0 (semver) Affected: N/A , < 1.31.0 (semver) Affected: N/A , < 1.32.0 (semver) Affected: N/A , < 1.50.0 (semver) Affected: N/A , < 2.30.0 (semver) |
Credits
Dell would like to thank schur of BUPT, Dubhe Lab for reporting this issue.
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:dell:edge_gateway_3000_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "edge_gateway_3000_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.18.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:latitude_13_3380:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_13_3380",
"vendor": "dell",
"versions": [
{
"lessThan": "1.27.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_3180_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_3180_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_3189_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_3189_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:latitude_3390_2-in-1:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_3390_2-in-1",
"vendor": "dell",
"versions": [
{
"lessThan": "1.31.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_5414_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_5414_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.46.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:dell:latitude_5424_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_5424_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.32.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_7414_rugged_extreme_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_7414_rugged_extreme_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.46.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:precision_3420_tower:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "precision_3420_tower",
"vendor": "dell",
"versions": [
{
"lessThan": "2.30.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:precision_3620_tower:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "precision_3620_tower",
"vendor": "dell",
"versions": [
{
"lessThan": "2.30.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_5280_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_5280_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "2.36.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_12_rugged_extreme_7214_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_12_rugged_extreme_7214_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.46.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_3300_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_3300_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.28.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:dell:latitude_7212_rugged_extreme_tablet_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_7212_rugged_extreme_tablet_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.50.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:wyse_5070:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "wyse_5070",
"vendor": "dell",
"versions": [
{
"lessThan": "1.31.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-22429",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-05-21T13:54:51.026876Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-06T14:03:23.200Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T22:43:35.008Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000221102/dsa-2024-020"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"lessThan": "2.36.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.18.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.46.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.27.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.29.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.28.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.32.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.50.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.30.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Dell would like to thank schur of BUPT, Dubhe Lab for reporting this issue."
}
],
"datePublic": "2024-05-14T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dell BIOS contains an Improper Input Validation vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to arbitrary code execution."
}
],
"value": "Dell BIOS contains an Improper Input Validation vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to arbitrary code execution."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20: Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-05-17T15:20:16.147Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000221102/dsa-2024-020"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2024-22429",
"datePublished": "2024-05-17T15:20:16.147Z",
"dateReserved": "2024-01-10T15:23:01.337Z",
"dateUpdated": "2024-08-01T22:43:35.008Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-28063 (GCVE-0-2023-28063)
Vulnerability from cvelistv5 – Published: 2024-02-06 07:38 – Updated: 2024-08-02 12:30
VLAI?
Summary
Dell BIOS contains a Signed to Unsigned Conversion Error vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to denial of service.
Severity ?
6.7 (Medium)
CWE
- CWE-195 - Signed to Unsigned Conversion Error
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dell | CPG BIOS |
Affected:
1.24.0
Affected: 1.17.0 Affected: 1.13.0 Affected: 1.5.1 Affected: 1.21.0 Affected: 1.20.0 Affected: 1.23.0 Affected: 1.26.0 Affected: 1.25.0 Affected: 1.15.0 Affected: 1.12.0 Affected: 2.20.0 Affected: 1.14.0 Affected: 1.27.0 Affected: 1.19.0 Affected: 1.22.1 Affected: 2.21.0 Affected: 1.18.0 Affected: 1.7.0 Affected: 1.28.0 Affected: 1.22.0 Affected: 1.29.0 Affected: 1.30.0 Affected: 1.11.0 Affected: 1.13.1 Affected: 1.26.1 Affected: 1.13.2 Affected: 1.14.1 Affected: 1.33.0 Affected: 1.31.0 Affected: 1.12.1 Affected: 1.18.1 Affected: 1.10.0 Affected: 2.14.0 Affected: 1.1.28 Affected: 1.4.1 Affected: 2.5.1 Affected: 2.4.0 Affected: 2.6.1 Affected: 1.26.8 Affected: 1.24.1 Affected: 1.17.1 Affected: 1.29.1 Affected: 1.1.0 Affected: 1.16.0 Affected: 3.17.0 Affected: 2.19.0 Affected: 1.8.1 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-28063",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-02-06T17:07:13.502616Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-07-05T17:21:34.998Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T12:30:23.947Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000214780/dsa-2023-176-dell-client-bios-security-update-for-a-signed-to-unsigned-conversion-error-vulnerability"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "1.24.0"
},
{
"status": "affected",
"version": "1.17.0"
},
{
"status": "affected",
"version": "1.13.0"
},
{
"status": "affected",
"version": "1.5.1"
},
{
"status": "affected",
"version": "1.21.0"
},
{
"status": "affected",
"version": "1.20.0"
},
{
"status": "affected",
"version": "1.23.0"
},
{
"status": "affected",
"version": "1.26.0"
},
{
"status": "affected",
"version": "1.25.0"
},
{
"status": "affected",
"version": "1.15.0"
},
{
"status": "affected",
"version": "1.12.0"
},
{
"status": "affected",
"version": "2.20.0"
},
{
"status": "affected",
"version": "1.14.0"
},
{
"status": "affected",
"version": "1.27.0"
},
{
"status": "affected",
"version": "1.19.0"
},
{
"status": "affected",
"version": "1.22.1"
},
{
"status": "affected",
"version": "2.21.0"
},
{
"status": "affected",
"version": "1.18.0"
},
{
"status": "affected",
"version": "1.7.0"
},
{
"status": "affected",
"version": "1.28.0"
},
{
"status": "affected",
"version": "1.22.0"
},
{
"status": "affected",
"version": "1.29.0"
},
{
"status": "affected",
"version": "1.30.0"
},
{
"status": "affected",
"version": "1.11.0"
},
{
"status": "affected",
"version": "1.13.1"
},
{
"status": "affected",
"version": "1.26.1"
},
{
"status": "affected",
"version": "1.13.2"
},
{
"status": "affected",
"version": "1.14.1"
},
{
"status": "affected",
"version": "1.33.0"
},
{
"status": "affected",
"version": "1.31.0"
},
{
"status": "affected",
"version": "1.12.1"
},
{
"status": "affected",
"version": "1.18.1"
},
{
"status": "affected",
"version": "1.10.0"
},
{
"status": "affected",
"version": "2.14.0"
},
{
"status": "affected",
"version": "1.1.28"
},
{
"status": "affected",
"version": "1.4.1"
},
{
"status": "affected",
"version": "2.5.1"
},
{
"status": "affected",
"version": "2.4.0"
},
{
"status": "affected",
"version": "2.6.1"
},
{
"status": "affected",
"version": "1.26.8"
},
{
"status": "affected",
"version": "1.24.1"
},
{
"status": "affected",
"version": "1.17.1"
},
{
"status": "affected",
"version": "1.29.1"
},
{
"status": "affected",
"version": "1.1.0"
},
{
"status": "affected",
"version": "1.16.0"
},
{
"status": "affected",
"version": "3.17.0"
},
{
"status": "affected",
"version": "2.19.0"
},
{
"status": "affected",
"version": "1.8.1"
}
]
}
],
"datePublic": "2023-06-13T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell BIOS contains a Signed to Unsigned Conversion Error vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to denial of service.\u003c/span\u003e\n\n"
}
],
"value": "\nDell BIOS contains a Signed to Unsigned Conversion Error vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to denial of service.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-195",
"description": "CWE-195: Signed to Unsigned Conversion Error",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-02-06T07:38:54.321Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000214780/dsa-2023-176-dell-client-bios-security-update-for-a-signed-to-unsigned-conversion-error-vulnerability"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-28063",
"datePublished": "2024-02-06T07:38:54.321Z",
"dateReserved": "2023-03-10T05:06:06.441Z",
"dateUpdated": "2024-08-02T12:30:23.947Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-28058 (GCVE-0-2023-28058)
Vulnerability from cvelistv5 – Published: 2023-06-23 10:30 – Updated: 2024-11-07 21:07
VLAI?
Summary
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
Severity ?
5.1 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T12:30:23.586Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-28058",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-07T21:06:57.836824Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-07T21:07:06.911Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "All Versions"
}
]
}
],
"datePublic": "2023-06-14T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\u003c/span\u003e\n\n"
}
],
"value": "\nDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20: Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-06-23T10:30:27.581Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-28058",
"datePublished": "2023-06-23T10:30:27.581Z",
"dateReserved": "2023-03-10T05:01:55.232Z",
"dateUpdated": "2024-11-07T21:07:06.911Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-28050 (GCVE-0-2023-28050)
Vulnerability from cvelistv5 – Published: 2023-06-23 10:25 – Updated: 2024-11-07 21:09
VLAI?
Summary
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
Severity ?
5.1 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T12:30:22.772Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-28050",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-07T21:07:21.607702Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-07T21:09:09.993Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "All Versions"
}
]
}
],
"datePublic": "2023-06-14T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\u003c/span\u003e\n\n"
}
],
"value": "\nDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20: Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-06-23T10:25:56.877Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-28050",
"datePublished": "2023-06-23T10:25:56.877Z",
"dateReserved": "2023-03-10T05:01:43.871Z",
"dateUpdated": "2024-11-07T21:09:09.993Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-28026 (GCVE-0-2023-28026)
Vulnerability from cvelistv5 – Published: 2023-06-23 10:23 – Updated: 2024-12-04 14:43
VLAI?
Summary
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
Severity ?
5.1 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T12:23:30.812Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-28026",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-12-04T14:43:48.808973Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-12-04T14:43:58.513Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "All Versions"
}
]
}
],
"datePublic": "2023-06-14T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\u003c/span\u003e\n\n"
}
],
"value": "\nDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20: Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-06-23T10:23:05.908Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-28026",
"datePublished": "2023-06-23T10:23:05.908Z",
"dateReserved": "2023-03-10T04:57:40.870Z",
"dateUpdated": "2024-12-04T14:43:58.513Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-28044 (GCVE-0-2023-28044)
Vulnerability from cvelistv5 – Published: 2023-06-23 10:20 – Updated: 2024-11-07 21:09
VLAI?
Summary
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
Severity ?
5.1 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T12:30:22.690Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-28044",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-07T21:09:18.405245Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-07T21:09:31.489Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "All Versions"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\u003c/span\u003e\n\n"
}
],
"value": "\nDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20: Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-06-23T10:20:01.132Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-28044",
"datePublished": "2023-06-23T10:20:01.132Z",
"dateReserved": "2023-03-10T04:59:39.426Z",
"dateUpdated": "2024-11-07T21:09:31.489Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-28060 (GCVE-0-2023-28060)
Vulnerability from cvelistv5 – Published: 2023-06-23 10:17 – Updated: 2024-11-07 21:26
VLAI?
Summary
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
Severity ?
5.1 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T12:30:22.781Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-28060",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-07T21:26:23.822877Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-07T21:26:38.861Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "All Versions"
}
]
}
],
"datePublic": "2023-06-14T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\u003c/span\u003e\n\n"
}
],
"value": "\nDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20: Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-06-23T10:17:46.249Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-28060",
"datePublished": "2023-06-23T10:17:46.249Z",
"dateReserved": "2023-03-10T05:01:55.232Z",
"dateUpdated": "2024-11-07T21:26:38.861Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}