Search criteria
20 vulnerabilities found for latitude_5431_firmware by dell
CVE-2024-52541 (GCVE-0-2024-52541)
Vulnerability from nvd – Published: 2025-02-19 16:46 – Updated: 2025-02-19 17:08
VLAI?
Summary
Dell Client Platform BIOS contains a Weak Authentication vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.
Severity ?
8.2 (High)
CWE
- CWE-1390 - Weak Authentication
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dell | Dell Client Platform BIOS |
Affected:
N/A , < 1.34.0
(semver)
Affected: N/A , < 1.28.0 (semver) Affected: N/A , < 1.21.0 (semver) Affected: N/A , < 1.8.0 (semver) Affected: N/A , < 1.9.0 (semver) Affected: N/A , < 1.17.0 (semver) Affected: N/A , < 1.7.0 (semver) Affected: N/A , < 1.26.0 (semver) Affected: N/A , < 1.20.0 (semver) Affected: N/A , < 1.31.1 (semver) Affected: N/A , < 1.30.0 (semver) Affected: N/A , < 1.29.0 (semver) Affected: N/A , < 1.32.0 (semver) Affected: N/A , < 1.21.1 (semver) Affected: N/A , < 1.25.1 (semver) Affected: N/A , < 1.33.0 (semver) Affected: N/A , < 1.31.0 (semver) Affected: N/A , < 2.31.0 (semver) Affected: N/A , < 2.39.0 (semver) Affected: N/A , < 2.43.0 (semver) Affected: N/A , < 1.27.0 (semver) Affected: N/A , < 1.22.0 (semver) Affected: N/A , < 1.18.0 (semver) Affected: N/A , < 2.30.0 (semver) Affected: N/A , < 1.24.0 (semver) Affected: N/A , < 1.25.0 (semver) Affected: N/A , < 1.10.0 (semver) Affected: N/A , < 1.14.0 (semver) Affected: N/A , < 1.6.1 (semver) Affected: N/A , < 1.15.1 (semver) Affected: N/A , < 1.36.1 (semver) Affected: N/A , < 1.33.1 (semver) Affected: N/A , < 1.48.0 (semver) Affected: N/A , < 1.37.0 (semver) Affected: N/A , < 1.27.1 (semver) Affected: N/A , < 1.26.1 (semver) Affected: N/A , < 1.16.0 (semver) Affected: N/A , < 1.35.1 (semver) Affected: N/A , < 1.32.1 (semver) Affected: N/A , < 1.38.0 (semver) Affected: N/A , < 1.40.0 (semver) Affected: N/A , < 1.35.0 (semver) Affected: N/A , < 1.36.0 (semver) Affected: N/A , < 1.41.0 (semver) Affected: N/A , < 1.31.2 (semver) Affected: N/A , < 1.18.1 (semver) Affected: N/A , < 1.39.0 (semver) Affected: N/A , < 1.53.0 (semver) Affected: N/A , < 1.19.1 (semver) Affected: N/A , < 1.38.1 (semver) Affected: N/A , < 1.7.1 (semver) Affected: N/A , < 1.8.1 (semver) Affected: N/A , < 1.23.0 (semver) Affected: N/A , < 1.34.1 (semver) Affected: N/A , < 1.23.2 (semver) Affected: N/A , < 1.30.1 (semver) Affected: N/A , < 2.28.1 (semver) Affected: N/A , < 2.22.1 (semver) Affected: N/A , < 1.28.1 (semver) Affected: N/A , < 1.1.44 (semver) Affected: N/A , < 3.10.0 (semver) Affected: N/A , < 1.6.0 (semver) Affected: N/A , < 2.33.0 (semver) Affected: N/A , < 2.20.0 (semver) Affected: N/A , < 2.34.0 (semver) Affected: N/A , < 1.15.0 (semver) Affected: N/A , < 1.34.8 (semver) Affected: N/A , < 1.9.1 (semver) Affected: N/A , < 2.6.1 (semver) Affected: N/A , < 01.11.02 (semver) Affected: N/A , < 2.31.1 (semver) Affected: N/A , < 3.27.1 (semver) Affected: N/A , < 2.29.1 (semver) Affected: N/A , < 2.18.1 (semver) Affected: N/A , < 1.13.0 (semver) Affected: N/A , < 1.11.0 (semver) Affected: N/A , < 1.11.1 (semver) Affected: N/A , < 2.24.1 (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-52541",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-19T17:07:39.827843Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-02-19T17:08:48.094Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"modules": [
"Alienware m15 R6",
"Alienware m15 R7",
"Alienware m16 R1",
"Alienware m16 R2",
"Alienware M18 R2",
"Alienware x14 R2",
"Alienware X16 R2",
"ChengMing 3900",
"ChengMing 3910/3911",
"ChengMing 3990",
"Dell Edge Gateway 5000",
"Dell G15 5510",
"Dell G15 5511",
"Dell G15 5530",
"Dell G5 5000",
"Dell Precision 3430 Tower",
"Dell Precision 3431 Tower",
"Dell Precision 3630 Tower",
"Dell Precision 5820 Tower",
"Dell Precision 7820 Tower",
"Embedded Box PC 5000",
"Inspiron 13 5320",
"Inspiron 13 5330",
"Inspiron 14\u00a0 5410/5418",
"Inspiron 14 5420",
"Inspiron 14 Plus 7420",
"Inspiron 14 Plus 7440",
"Inspiron 15 3530",
"Inspiron 16 5640",
"Inspiron 24 5420 All-in-One",
"Inspiron 5301",
"Inspiron 5400/5401",
"Latitude 12 Rugged Extreme 7214",
"Latitude 3190",
"Latitude 3310",
"Latitude 3310 2-In-1",
"Latitude 3340",
"Latitude 3400",
"Latitude 3410",
"Latitude 3420",
"Latitude 5320",
"Latitude 5400",
"Latitude 5401",
"Latitude 5420",
"Latitude 5430 Rugged Laptop",
"Latitude 5440",
"Latitude 5480",
"Latitude 7212 Rugged Extreme Tablet",
"Latitude 7230 Rugged Extreme",
"Latitude 7320",
"Latitude 7350 Detachable",
"Latitude 7450",
"Latitude 9330",
"Latitude 9420",
"OptiPlex 3000 Thin Client",
"OptiPlex 3070",
"OptiPlex 3080",
"OptiPlex 3090",
"OptiPlex 5080",
"OptiPlex 5400 All-In-One",
"Precision 3260 XE Compact / Precision 3260 Compact",
"Precision 3280 CFF",
"Precision 3420 Tower",
"Precision 3660",
"Precision 3930 Rack",
"Precision 5480",
"Precision 5530 2-In-1",
"Precision 5690",
"Precision 5860 Tower",
"Precision 7875 Tower",
"Vostro 3681",
"XPS 13 9310",
"XPS 13 9310 2-in-1",
"XPS 13 Plus 9320",
"XPS 13 9340",
"XPS 14 9440",
"XPS 16 9640",
"XPS 8940"
],
"product": "Dell Client Platform BIOS",
"vendor": "Dell",
"versions": [
{
"lessThan": "1.34.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.28.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.21.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.8.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.9.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.17.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.7.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.26.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.20.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.30.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.29.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.32.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.21.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.25.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.33.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.31.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.39.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.43.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.27.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.22.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.18.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.30.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.24.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.25.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.10.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.14.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.6.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.15.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.36.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.33.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.48.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.37.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.27.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.26.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.16.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.35.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.32.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.38.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.40.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.35.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.36.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.41.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.18.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.39.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.53.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.19.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.38.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.7.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.8.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.23.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.34.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.23.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.30.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.28.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.22.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.28.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.1.44",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "3.10.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.6.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.33.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.20.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.34.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.15.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.34.8",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.9.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.6.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "01.11.02",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.31.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "3.27.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.29.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.18.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.13.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.11.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.11.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.24.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
}
]
}
],
"datePublic": "2025-02-17T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dell Client Platform BIOS contains a Weak Authentication vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.\u003cbr\u003e"
}
],
"value": "Dell Client Platform BIOS contains a Weak Authentication vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-1390",
"description": "CWE-1390: Weak Authentication",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-02-19T16:46:22.803Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000258429/dsa-2025-021"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2024-52541",
"datePublished": "2025-02-19T16:46:22.803Z",
"dateReserved": "2024-11-12T06:04:07.776Z",
"dateUpdated": "2025-02-19T17:08:48.094Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-43078 (GCVE-0-2023-43078)
Vulnerability from nvd – Published: 2024-08-28 05:33 – Updated: 2024-08-28 22:31
VLAI?
Summary
Dell Dock Firmware and Dell Client Platform contain an Improper Link Resolution vulnerability during installation resulting in arbitrary folder deletion, which could lead to Privilege Escalation or Denial of Service.
Severity ?
6.7 (Medium)
CWE
- CWE-59 - Improper Link Resolution Before File Access ('Link Following')
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dell | Dell Client Platform, Dell Dock Firmware |
Affected:
N/A , < 1.27.0
(semver)
Affected: N/A , < 1.22.0 (semver) Affected: N/A , < 1.14.1 (semver) Affected: N/A , < 1.11.0 (semver) Affected: N/A , < 1.19.0 (semver) Affected: N/A , < 1.20.0 (semver) Affected: N/A , < 1.24.0 (semver) Affected: N/A , < 1.26.0 (semver) Affected: N/A , < 1.12.0 (semver) Affected: N/A , < 1.28.0 (semver) Affected: N/A , < 1.17.0 (semver) Affected: N/A , < 1.23.0 (semver) Affected: N/A , < 1.30.0 (semver) Affected: N/A , < 2.25.0 (semver) Affected: N/A , < 1.16.0 (semver) Affected: N/A , < 1.12.1 (semver) Affected: N/A , < 2.24.0 (semver) Affected: N/A , < 1.8.0 (semver) Affected: N/A , < 1.18.0 (semver) Affected: N/A , < 1.29.0 (semver) Affected: N/A , < 1.24.1 (semver) Affected: N/A , < 1.22.1 (semver) Affected: N/A , < 1.31.0 (semver) Affected: N/A , < 1.25.0 (semver) Affected: N/A , < 1.10.0 (semver) Affected: N/A , < 1.34.0 (semver) Affected: N/A , < 1.32.0 (semver) Affected: N/A , < 1.36.0 (semver) Affected: N/A , < 1.10.1 (semver) Affected: N/A , < 1.36.2 (semver) Affected: N/A , < 1.21.1 (semver) Affected: N/A , < 1.33.0 (semver) Affected: N/A , < 1.35.0 (semver) Affected: N/A , < 1.34.2 (semver) Affected: N/A , < 1.30.1 (semver) Affected: N/A , < 1.15.0 (semver) Affected: N/A , < 2.22.0 (semver) Affected: N/A , < 2.16.0 (semver) Affected: N/A , < 1.22.2 (semver) Affected: N/A , < 1.1.37 (semver) Affected: N/A , < 1.27.1 (semver) Affected: N/A , < 3.3.2 (semver) Affected: N/A , < 1.28.1 (semver) Affected: N/A , < 2.11.1 (semver) Affected: N/A , < 2.28.0 (semver) Affected: N/A , < 1.28.8 (semver) Affected: N/A , < 1.1.16 (semver) Affected: N/A , < 1.20.1 (semver) Affected: N/A , < 1.9.0 (semver) Affected: N/A , < 1.6.1 (semver) Affected: N/A , < 1.1.15 (semver) Affected: N/A , < 2.23.0 (semver) Affected: N/A , < 3.20.0 (semver) Affected: N/A , < 1.19.1 (semver) Affected: N/A , < 2.9.0 (semver) Affected: N/A , < 1.13.0 (semver) Affected: N/A , < 1.0.14.20 (semver) Affected: N/A , < 01.00.15 (semver) Affected: N/A , < 01.00.36 (semver) Affected: N/A , < 4.62.156.006 (semver) Affected: N/A , < 4.66.128.015 (semver) Affected: N/A , < 4.65.111.022 (semver) Affected: N/A , < 4.61.124.014 (semver) Affected: N/A , < 4.46.147.004 (semver) Affected: N/A , < 4.46.134.013 (semver) Affected: N/A , < 4.66.131.016 (semver) Affected: N/A , < 4.46.135.009 (semver) Affected: N/A , < 4.65.162.003 (semver) Affected: N/A , < 4.65.119.017 (semver) Affected: N/A , < 4.62.140.014 (semver) Affected: N/A , < 4.46.166.001 (semver) Affected: N/A , < 4.65.163.002 (semver) Affected: N/A , < 4.62.139.013 (semver) Affected: N/A , < 4.46.112.015 (semver) Affected: N/A , < 4.65.116.019 (semver) Affected: N/A , < 4.46.143.009 (semver) Affected: N/A , < 4.46.145.004 (semver) Affected: N/A , < 4.65.117.031 (semver) Affected: N/A , < 4.62.102.024 (semver) Affected: N/A , < 4.65.108.018 (semver) Affected: N/A , < 4.69.120.013 (semver) Affected: N/A , < 4.46.106.031 (semver) Affected: N/A , < 7.2.2.0 (semver) Affected: N/A , < 74.64 (semver) |
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:dell:wyse_5070_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3480_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3580_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3583_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3540_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3561_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7560_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7760_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7780_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7480_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5480_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_9420_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5521_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3320_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3580_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3480_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_m15_r6_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "alienware_m15_r6_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.27.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_17_9720_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:xps_13_9300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:wyse_5470_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_14_3420_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_15_3520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5570_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5080_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7070_ultra_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3120_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3310_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5310_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5310_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_15_3520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g16_7620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g15_5510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g15_5520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_m15_r7_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "alienware_m15_r7_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.22.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:alienware_m18_r1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_m16_r1_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "alienware_m16_r1_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.14.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:vostro_16_5630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3020_small_desktop_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3020_tower_desktop_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3480_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_all-in-one_7410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_micro_7010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_micro_plus_7010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_small_form_factor_7010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_small_form_factor_plus_7010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_tower_7010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_tower_plus_7010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5440_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7340_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7440_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3020_desktop_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3020_small_desktop_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_16_5630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_16_7630_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_14_5430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_14_7430_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:chengming_3911_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:chengming_3910_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_x16_r1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_x14_r2_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "alienware_x14_r2_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.11.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_13_9305_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3910_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_5620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3470_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5470_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_xe4_tower_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7000_micro_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7000_small_form_factor_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7000_tower_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7000_xe_micro_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5000_micro_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5000_small_form_factor_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5000_tower_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3000_micro_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3000_small_form_factor_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3000_tower_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3330_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5330_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5431_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3910_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_16_5620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_14_5420_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:chengming_3900_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "chengming_3900_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.19.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_15_9520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_15_7510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3471_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3671_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_7620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3571_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5570_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5531_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7330_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7530_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_9430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3671_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3471_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_16_plus_7620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_16_7610_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_15_7510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_14_plus_7420_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:chengming_3988_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "chengming_3988_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.20.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_17_9710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_5090_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5760_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3070_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5070_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7070_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7071_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_9510_2in1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7700_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5401_aio_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5401_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:chengming_3990_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:chengming_3991_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "chengming_3991_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.24.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_15_9500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_7500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3590_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_15_3510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3280_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5270_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7470_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7770_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7310_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7210_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7200_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5421_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7501_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_15_3511_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g15_5511_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "g15_5511_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.26.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_7230_rugged_extreme_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3140_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_16_plus_7630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_14_plus_7430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g16_7630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g15_5530_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "g15_5530_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.12.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_17_9700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3401_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3501_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_5402_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_5502_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3541_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_xe3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7060_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5060_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3060_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5401_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5501_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7320_detachable_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3501_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5402_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5406_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5409_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5502_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5509_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7306_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7506_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7706_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3430_tower_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g5_5500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g3_3500_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "g3_3500_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.28.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_9330_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_16_7620_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_14_7420_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g5_5000_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "g5_5000_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.17.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_13_7390_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:wyse_5470_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_5880_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3240_compact_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3440_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7080_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7330_rugged_laptop_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5430_rugged_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3310_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3431_tower_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g5_5090_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "g5_5090_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.23.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:precision_3530_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7760_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7460_all_in_one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5260_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5491_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5591_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:dell_g7_7500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:dell_g7_7700_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "dell_g7_7700_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.30.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:vostro_13_5310_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_13_5310_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3630_tower_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "precision_3630_tower_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "2.25.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:vostro_5320_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3530_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_13_5320_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_13_5320_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.16.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:inspiron_13_5330_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_13_5330_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.12.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:vostro_15_5510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_14_5410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_15_5510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_15_5518_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_14_5418_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_14_5410_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_14_5410_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "2.24.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:vostro_14_3430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_15_3530_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5480_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_9440_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_27_7720_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_24_5420_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_15_3530_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_15_3530_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.8.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:inspiron_27_7710_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_24_5410_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_24_5411_all-in-one_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_24_5411_all-in-one_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.18.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_13_7390_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7740_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7540_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7424_rugged_extreme_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5420_rugged_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5424_rugged_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5300_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3301_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5593_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3793_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3593_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_3593_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:inspiron_3881_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3880_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_3880_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.24.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:vostro_5890_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3890_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3690_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3891_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_3891_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.22.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:vostro_5301_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7730_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7530_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5290_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3190_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3190_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5301_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_5301_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.31.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_15_7590_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:xps_15_9510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5560_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5540_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3551_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7090_ultra_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3090_ultra_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_9410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7400_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5511_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5411_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3300_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_3300_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.25.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_15_9530_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5680_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3540_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3440_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3340_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_3340_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.10.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:precision_5530_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3420_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_3420_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.34.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_5590_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5290_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_5290_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.32.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:precision_3560_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5320_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_5320_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.36.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:precision_3580_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3581_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5540_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5340_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_5340_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.10.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_5420_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_5420_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.36.2",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:precision_3570_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5530_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_5530_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.21.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_rugged_7220_extreme_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7220_rugged_extreme_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_7220_rugged_extreme_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.33.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_7490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7390_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7290_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_7290_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.35.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_7520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7420_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7320_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_7320_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.34.2",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_9520_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_9520_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.30.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:optiplex_3000_thin_client_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "optiplex_3000_thin_client_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.15.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_13_9310_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3080_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "optiplex_3080_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "2.22.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_8940_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3090_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "optiplex_3090_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "2.16.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:optiplex_7090_tower_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5090_micro_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5090_small_form_factor_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5090_tower_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "optiplex_5090_tower_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.22.2",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:optiplex_7400_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5400_all-in-one_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "optiplex_5400_all-in-one_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.1.37",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:optiplex_7490_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5490_all-in-one_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "optiplex_5490_all-in-one_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.27.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:precision_3460_small_form_factor_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3460_xe_small_form_factor_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3260_compact_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3260_xe_compact_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "precision_3260_xe_compact_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "3.3.2",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:precision_3650_tower_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "precision_3650_tower_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.28.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:precision_3660_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "precision_3660_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "2.11.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-43078",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-28T14:17:19.963412Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-08-28T22:31:00.645Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Dell Client Platform, Dell Dock Firmware",
"vendor": "Dell",
"versions": [
{
"lessThan": "1.27.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.22.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.14.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.11.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.19.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.20.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.24.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.26.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.12.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.28.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.17.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.23.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.30.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.25.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.16.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.12.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.24.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.8.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.18.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.29.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.24.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.22.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.25.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.10.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.34.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.32.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.36.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.10.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.36.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.21.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.33.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.35.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.34.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.30.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.15.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.22.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.16.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.22.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.1.37",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.27.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "3.3.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.28.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.11.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.28.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.28.8",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.1.16",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.20.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.9.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.6.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.1.15",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.23.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "3.20.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.19.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.9.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.13.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.0.14.20",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "01.00.15",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "01.00.36",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.62.156.006",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.66.128.015",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.65.111.022",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.61.124.014",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.46.147.004",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.46.134.013",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.66.131.016",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.46.135.009",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.65.162.003",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.65.119.017",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.62.140.014",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.46.166.001",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.65.163.002",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.62.139.013",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.46.112.015",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.65.116.019",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.46.143.009",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.46.145.004",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.65.117.031",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.62.102.024",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.65.108.018",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.69.120.013",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.46.106.031",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "7.2.2.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "74.64",
"status": "affected",
"version": "N/A",
"versionType": "semver"
}
]
}
],
"datePublic": "2024-02-22T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dell Dock Firmware and Dell Client Platform contain an Improper Link Resolution vulnerability during installation resulting in arbitrary folder deletion, which could lead to Privilege Escalation or Denial of Service."
}
],
"value": "Dell Dock Firmware and Dell Client Platform contain an Improper Link Resolution vulnerability during installation resulting in arbitrary folder deletion, which could lead to Privilege Escalation or Denial of Service."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-59",
"description": "CWE-59: Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-28T05:33:16.899Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000217981/dsa-2023-362-security-update-for-dell-dock-firmware-and-dell-client-platform-for-an-improper-link-resolution-vulnerability"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-43078",
"datePublished": "2024-08-28T05:33:16.899Z",
"dateReserved": "2023-09-15T07:02:11.648Z",
"dateUpdated": "2024-08-28T22:31:00.645Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-0158 (GCVE-0-2024-0158)
Vulnerability from nvd – Published: 2024-07-02 06:20 – Updated: 2024-08-01 17:41
VLAI?
Summary
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with admin privileges may potentially exploit this vulnerability to modify a UEFI variable, leading to denial of service and escalation of privileges
Severity ?
5.1 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dell | CPG BIOS |
Affected:
N/A , < 1.28.0
(semver)
Affected: N/A , < 1.23.0 (semver) Affected: N/A , < 1.15.0 (semver) Affected: N/A , < 1.2.1 (semver) Affected: N/A , < 1.12.1 (semver) Affected: N/A , < 1.2.0 (semver) Affected: N/A , < 1.20.0 (semver) Affected: N/A , < 1.12.0 (semver) Affected: N/A , < 1.26.0 (semver) Affected: N/A , < 1.27.0 (semver) Affected: N/A , < 1.13.0 (semver) Affected: N/A , < 1.29.0 (semver) Affected: N/A , < 1.19.0 (semver) Affected: N/A , < 1.25.0 (semver) Affected: N/A , < 1.31.0 (semver) Affected: N/A , < 2.27.0 (semver) Affected: N/A , < 2.35.0 (semver) Affected: N/A , < 2.39.0 (semver) Affected: N/A , < 1.17.0 (semver) Affected: N/A , < 1.24.0 (semver) Affected: N/A , < 2.26.0 (semver) Affected: N/A , < 1.13.1 (semver) Affected: N/A , < 2.25.0 (semver) Affected: N/A , < 1.3.1 (semver) Affected: N/A , < 1.18.0 (semver) Affected: N/A , < 1.21.0 (semver) Affected: N/A , < 1.22.0 (semver) Affected: N/A , < 1.9.0 (semver) Affected: N/A , < 1.3.0 (semver) Affected: N/A , < 1.30.0 (semver) Affected: N/A , < 1.32.0 (semver) Affected: N/A , < 1.29..0 (semver) Affected: N/A , < 1.45.0 (semver) Affected: N/A , < 1.33.0 (semver) Affected: N/A , < 1.11.0 (semver) Affected: N/A , < 1.35.0 (semver) Affected: N/A , < 1.34.0 (semver) Affected: N/A , < 1.36.0 (semver) Affected: N/A , < 1.36.2 (semver) Affected: N/A , < 1.25.1 (semver) Affected: N/A , < 1.21.1 (semver) Affected: N/A , < 1.4.1 (semver) Affected: N/A , < 1.49.0 (semver) Affected: N/A , < 1.37.0 (semver) Affected: N/A , < 1.34.2 (semver) Affected: N/A , < 1.30.1 (semver) Affected: N/A , < 1.16.1 (semver) Affected: N/A , < 2.24.0 (semver) Affected: N/A , < 2.18.0 (semver) Affected: N/A , < 1.1.38 (semver) Affected: N/A , < 3.3.2 (semver) Affected: N/A , < 2.29.0 (semver) Affected: N/A , < 2.12.0 (semver) Affected: N/A , < 2.30.0 (semver) Affected: N/A , < 1.30.8 (semver) Affected: N/A , < 1.10.0 (semver) Affected: N/A , < 1.26.1 (semver) Affected: N/A , < 1.1.17 (semver) Affected: N/A , < 1.20.1 (semver) Affected: N/A , < 1.7.0 (semver) Affected: N/A , < 01.03.00 (semver) Affected: N/A , < 1.1.16 (semver) Affected: N/A , < 3.21.0 (semver) Affected: N/A , < 2.23.0 (semver) Affected: N/A , < 1.19.1 (semver) Affected: N/A , < 2.10.0 (semver) Affected: N/A , < 2.18.1 (semver) Affected: N/A , < 1.14.0 (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-0158",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-07-02T14:21:02.955425Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-07-02T14:21:13.009Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T17:41:16.039Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-in/000220141/dsa-2024-030-security-update-for-dell-client-bios-for-an-improper-input-validation-vulnerability"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"lessThan": "1.28.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.23.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.15.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.2.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.12.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.2.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.20.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.12.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.26.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.27.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.13.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.29.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.19.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.25.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.27.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.35.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.39.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.17.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.24.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.26.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.13.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.25.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.3.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.18.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.21.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.22.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.9.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.3.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.30.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.32.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.29..0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.45.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.33.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.11.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.35.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.34.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.36.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.36.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.25.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.21.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.4.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.49.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.37.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.34.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.30.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.16.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.24.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.18.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.1.38",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "3.3.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.29.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.12.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.30.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.30.8",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.10.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.26.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.1.17",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.20.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.7.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "01.03.00",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.1.16",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "3.21.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.23.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.19.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.10.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.18.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.14.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
}
]
}
],
"datePublic": "2024-03-12T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with admin privileges may potentially exploit this vulnerability to modify a UEFI variable, leading to denial of service and escalation of privileges"
}
],
"value": "Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with admin privileges may potentially exploit this vulnerability to modify a UEFI variable, leading to denial of service and escalation of privileges"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20: Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-07-02T06:20:44.735Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-in/000220141/dsa-2024-030-security-update-for-dell-client-bios-for-an-improper-input-validation-vulnerability"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2024-0158",
"datePublished": "2024-07-02T06:20:44.735Z",
"dateReserved": "2023-12-14T05:30:35.591Z",
"dateUpdated": "2024-08-01T17:41:16.039Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-22448 (GCVE-0-2024-22448)
Vulnerability from nvd – Published: 2024-04-10 07:30 – Updated: 2024-08-01 22:43
VLAI?
Summary
Dell BIOS contains an Out-of-Bounds Write vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to denial of service.
Severity ?
4.7 (Medium)
CWE
- CWE-787 - Out-of-bounds Write
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dell | CPG BIOS |
Affected:
N/A , < 1.29.0
(semver)
Affected: N/A , < 1.16.0 (semver) Affected: N/A , < 1.13.0 (semver) Affected: N/A , < 1.28.0 (semver) Affected: N/A , < 1.14.0 (semver) Affected: N/A , < 1.31.0 (semver) Affected: N/A , < 1.31.1 (semver) Affected: N/A , < 1.31.2 (semver) Affected: N/A , < 1.31.3 (semver) Affected: N/A , < 1.31.4 (semver) Affected: N/A , < 1.31.5 (semver) Affected: N/A , < 1.31.6 (semver) Affected: N/A , < 1.31.7 (semver) Affected: N/A , < 1.31.8 (semver) Affected: N/A , < 1.31.9 (semver) Affected: N/A , < 1.31.10 (semver) Affected: N/A , < 1.31.11 (semver) Affected: N/A , < 1.31.12 (semver) Affected: N/A , < 1.31.13 (semver) Affected: N/A , < 1.31.14 (semver) Affected: N/A , < 1.31.15 (semver) Affected: N/A , < 1.31.16 (semver) |
Credits
Dell Technologies would like to thank Eason for reporting this issue.
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:dell:alienware_16_r1:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "alienware_16_r1",
"vendor": "dell",
"versions": [
{
"lessThan": "1.13.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:dell:alienware_15_r6:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "alienware_15_r6",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:dell:alienware_18_r1:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "alienware_18_r1",
"vendor": "dell",
"versions": [
{
"lessThan": "1.16.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:dell:alienware_14_r2:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "alienware_14_r2",
"vendor": "dell",
"versions": [
{
"lessThan": "1.13.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:g15_5511:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "g15_5511",
"vendor": "dell",
"versions": [
{
"lessThan": "1.28.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:g15_5530:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "g15_5530",
"vendor": "dell",
"versions": [
{
"lessThan": "1.14.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:g16_7620:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "g16_7620",
"vendor": "dell",
"versions": [
{
"lessThan": "1.14.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:g3_3500:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "g3_3500",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:g5_5500:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "g5_5500",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:g7_7500:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "g7_7500",
"vendor": "dell",
"versions": [
{
"lessThan": "1.31.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:g7_7700:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "g7_7700",
"vendor": "dell",
"versions": [
{
"lessThan": "1.31.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:inspiron_13_5330:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "inspiron_13_5330",
"vendor": "dell",
"versions": [
{
"lessThan": "1.14.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:dell:inspiron_15_3530:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "inspiron_15_3530",
"vendor": "dell",
"versions": [
{
"lessThan": "1.10.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:dell:inspiron_3030s:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "inspiron_3030s",
"vendor": "dell",
"versions": [
{
"lessThan": "1.3.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:inspiron_5301:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "inspiron_5301",
"vendor": "dell",
"versions": [
{
"lessThan": "1.32.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:inspiron_5400:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "inspiron_5400",
"vendor": "dell",
"versions": [
{
"lessThan": "1.27.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:inspiron_5401:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "inspiron_5401",
"vendor": "dell",
"versions": [
{
"lessThan": "1.27.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:inspiron_5402:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "inspiron_5402",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:inspiron_5409:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "inspiron_5409",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:inspiron_5502:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "inspiron_5502",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:inspiron_5509:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "inspiron_5509",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:inspiron_7300:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "inspiron_7300",
"vendor": "dell",
"versions": [
{
"lessThan": "1.32.0",
"status": "affected",
"version": "-",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:inspiron_7400:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "inspiron_7400",
"vendor": "dell",
"versions": [
{
"lessThan": "1.32.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:inspiron_7700_aio:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "inspiron_7700_aio",
"vendor": "dell",
"versions": [
{
"lessThan": "1.27.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:latitude_5310:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_5310",
"vendor": "dell",
"versions": [
{
"lessThan": "1.23.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:latitude_5310_2_in_1:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_5310_2_in_1",
"vendor": "dell",
"versions": [
{
"lessThan": "1.23.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:latitude_5330:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_5330",
"vendor": "dell",
"versions": [
{
"lessThan": "1.321.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:dell:latitude_5340:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_5340",
"vendor": "dell",
"versions": [
{
"lessThan": "1.12.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:latitude_5531:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_5531",
"vendor": "dell",
"versions": [
{
"lessThan": "1.22.0",
"status": "affected",
"version": "-",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:dell:latitude_5540:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_5540",
"vendor": "dell",
"versions": [
{
"lessThan": "1.12.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:latitude_7320:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_7320",
"vendor": "dell",
"versions": [
{
"lessThan": "1.34.0",
"status": "affected",
"version": "-",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:dell:latitude_7340:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_7340",
"vendor": "dell",
"versions": [
{
"lessThan": "1.13.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:latitude_7420:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_7420",
"vendor": "dell",
"versions": [
{
"lessThan": "1.34.0",
"status": "affected",
"version": "-",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:latitude_7520:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_7520",
"vendor": "dell",
"versions": [
{
"lessThan": "1.34.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:latitude_9330:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_9330",
"vendor": "dell",
"versions": [
{
"lessThan": "1.19.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:latitude_9420:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_9420",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:latitude_9430:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_9430",
"vendor": "dell",
"versions": [
{
"lessThan": "1.22.0",
"status": "affected",
"version": "-",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:dell:latitude_9440_2in1:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_9440_2in1",
"vendor": "dell",
"versions": [
{
"lessThan": "1.10.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:optiplex_micro_7010:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "optiplex_micro_7010",
"vendor": "dell",
"versions": [
{
"lessThan": "1.13.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:optiplex_small_form_factor_7010:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "optiplex_small_form_factor_7010",
"vendor": "dell",
"versions": [
{
"lessThan": "1.13.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:optiplex_tower_7010:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "optiplex_tower_7010",
"vendor": "dell",
"versions": [
{
"lessThan": "1.13.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:precision_3440:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "precision_3440",
"vendor": "dell",
"versions": [
{
"lessThan": "1.25.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:precision_3571:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "precision_3571",
"vendor": "dell",
"versions": [
{
"lessThan": "1.22.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:dell:precision_3580:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "precision_3580",
"vendor": "dell",
"versions": [
{
"lessThan": "1.12.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:precision_3581:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "precision_3581",
"vendor": "dell",
"versions": [
{
"lessThan": "1.12.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:precision_3660:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "precision_3660",
"vendor": "dell",
"versions": [
{
"lessThan": "2.13.0",
"status": "affected",
"version": "-",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:precision_5570:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "precision_5570",
"vendor": "dell",
"versions": [
{
"lessThan": "1.22.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:precision_5750:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "precision_5750",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:precision_5770:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "precision_5770",
"vendor": "dell",
"versions": [
{
"lessThan": "1.24.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:vostro_14_3430:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "vostro_14_3430",
"vendor": "dell",
"versions": [
{
"lessThan": "1.10.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:vostro_15_3530:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "vostro_15_3530",
"vendor": "dell",
"versions": [
{
"lessThan": "1.10.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:vostro_3030s:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "vostro_3030s",
"vendor": "dell",
"versions": [
{
"lessThan": "1.3.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:vostro_5301:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "vostro_5301",
"vendor": "dell",
"versions": [
{
"lessThan": "1.32.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:vostro_5402:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "vostro_5402",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:vostro_5502:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "vostro_5502",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "-",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:vostro_5880:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "vostro_5880",
"vendor": "dell",
"versions": [
{
"lessThan": "1.25.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:xps_17_9700:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "xps_17_9700",
"vendor": "dell",
"versions": [
{
"lessThan": "1.24.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:xps_17_9730:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "xps_17_9730",
"vendor": "dell",
"versions": [
{
"lessThan": "1.11.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:xps_9315_2in1:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "xps_9315_2in1",
"vendor": "dell",
"versions": [
{
"lessThan": "1.15.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-22448",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-04-22T16:57:10.462584Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T17:52:58.050Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T22:43:34.907Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000221744/dsa-2024-066"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.16.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.13.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.28.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.14.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.3",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.4",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.5",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.6",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.7",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.8",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.9",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.10",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.11",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.12",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.13",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.14",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.15",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.16",
"status": "affected",
"version": "N/A",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Dell Technologies would like to thank Eason for reporting this issue."
}
],
"datePublic": "2024-04-09T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dell BIOS contains an Out-of-Bounds Write vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to denial of service."
}
],
"value": "Dell BIOS contains an Out-of-Bounds Write vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to denial of service."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-787",
"description": "CWE-787: Out-of-bounds Write",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-04-10T07:30:08.507Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000221744/dsa-2024-066"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2024-22448",
"datePublished": "2024-04-10T07:30:08.507Z",
"dateReserved": "2024-01-10T15:26:10.250Z",
"dateUpdated": "2024-08-01T22:43:34.907Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-48674 (GCVE-0-2023-48674)
Vulnerability from nvd – Published: 2024-03-01 12:35 – Updated: 2024-08-02 21:37
VLAI?
Summary
Dell Platform BIOS contains an Improper Null Termination vulnerability. A high privilege user with network access to the system could potentially send malicious data to the device in order to cause some services to cease to function.
Severity ?
6.8 (Medium)
CWE
- CWE-170 - Improper Null Termination
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dell | CPG BIOS |
Affected:
N/A , < 1.28.0
(semver)
Affected: N/A , < 1.27.1 (semver) Affected: N/A , < 1.24.0 (semver) Affected: N/A , < 1.12.0 (semver) Affected: N/A , < 1.32.0 (semver) Affected: N/A , < 1.26.0 (semver) Affected: N/A , < 1.27.0 (semver) Affected: N/A , < 1.11.0 (semver) Affected: N/A , < 1.20.0 (semver) Affected: N/A , < 1.9.0 (semver) Affected: N/A , < 3.20.0 (semver) Affected: N/A , < 1.17.0 (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-48674",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-03-05T19:14:09.277249Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T17:27:37.432Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T21:37:54.645Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000220410/dsa-2023-467"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"lessThan": "1.28.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.27.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.24.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.12.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.32.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.26.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.27.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.11.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.20.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.9.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "3.20.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.17.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
}
]
}
],
"datePublic": "2024-02-13T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dell Platform BIOS contains an Improper Null Termination vulnerability. A high privilege user with network access to the system could potentially send malicious data to the device in order to cause some services to cease to function."
}
],
"value": "Dell Platform BIOS contains an Improper Null Termination vulnerability. A high privilege user with network access to the system could potentially send malicious data to the device in order to cause some services to cease to function."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-170",
"description": "CWE-170: Improper Null Termination",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-03-01T12:49:58.995Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000220410/dsa-2023-467"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-48674",
"datePublished": "2024-03-01T12:35:56.866Z",
"dateReserved": "2023-11-17T06:17:23.509Z",
"dateUpdated": "2024-08-02T21:37:54.645Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-28063 (GCVE-0-2023-28063)
Vulnerability from nvd – Published: 2024-02-06 07:38 – Updated: 2024-08-02 12:30
VLAI?
Summary
Dell BIOS contains a Signed to Unsigned Conversion Error vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to denial of service.
Severity ?
6.7 (Medium)
CWE
- CWE-195 - Signed to Unsigned Conversion Error
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dell | CPG BIOS |
Affected:
1.24.0
Affected: 1.17.0 Affected: 1.13.0 Affected: 1.5.1 Affected: 1.21.0 Affected: 1.20.0 Affected: 1.23.0 Affected: 1.26.0 Affected: 1.25.0 Affected: 1.15.0 Affected: 1.12.0 Affected: 2.20.0 Affected: 1.14.0 Affected: 1.27.0 Affected: 1.19.0 Affected: 1.22.1 Affected: 2.21.0 Affected: 1.18.0 Affected: 1.7.0 Affected: 1.28.0 Affected: 1.22.0 Affected: 1.29.0 Affected: 1.30.0 Affected: 1.11.0 Affected: 1.13.1 Affected: 1.26.1 Affected: 1.13.2 Affected: 1.14.1 Affected: 1.33.0 Affected: 1.31.0 Affected: 1.12.1 Affected: 1.18.1 Affected: 1.10.0 Affected: 2.14.0 Affected: 1.1.28 Affected: 1.4.1 Affected: 2.5.1 Affected: 2.4.0 Affected: 2.6.1 Affected: 1.26.8 Affected: 1.24.1 Affected: 1.17.1 Affected: 1.29.1 Affected: 1.1.0 Affected: 1.16.0 Affected: 3.17.0 Affected: 2.19.0 Affected: 1.8.1 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-28063",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-02-06T17:07:13.502616Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-07-05T17:21:34.998Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T12:30:23.947Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000214780/dsa-2023-176-dell-client-bios-security-update-for-a-signed-to-unsigned-conversion-error-vulnerability"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "1.24.0"
},
{
"status": "affected",
"version": "1.17.0"
},
{
"status": "affected",
"version": "1.13.0"
},
{
"status": "affected",
"version": "1.5.1"
},
{
"status": "affected",
"version": "1.21.0"
},
{
"status": "affected",
"version": "1.20.0"
},
{
"status": "affected",
"version": "1.23.0"
},
{
"status": "affected",
"version": "1.26.0"
},
{
"status": "affected",
"version": "1.25.0"
},
{
"status": "affected",
"version": "1.15.0"
},
{
"status": "affected",
"version": "1.12.0"
},
{
"status": "affected",
"version": "2.20.0"
},
{
"status": "affected",
"version": "1.14.0"
},
{
"status": "affected",
"version": "1.27.0"
},
{
"status": "affected",
"version": "1.19.0"
},
{
"status": "affected",
"version": "1.22.1"
},
{
"status": "affected",
"version": "2.21.0"
},
{
"status": "affected",
"version": "1.18.0"
},
{
"status": "affected",
"version": "1.7.0"
},
{
"status": "affected",
"version": "1.28.0"
},
{
"status": "affected",
"version": "1.22.0"
},
{
"status": "affected",
"version": "1.29.0"
},
{
"status": "affected",
"version": "1.30.0"
},
{
"status": "affected",
"version": "1.11.0"
},
{
"status": "affected",
"version": "1.13.1"
},
{
"status": "affected",
"version": "1.26.1"
},
{
"status": "affected",
"version": "1.13.2"
},
{
"status": "affected",
"version": "1.14.1"
},
{
"status": "affected",
"version": "1.33.0"
},
{
"status": "affected",
"version": "1.31.0"
},
{
"status": "affected",
"version": "1.12.1"
},
{
"status": "affected",
"version": "1.18.1"
},
{
"status": "affected",
"version": "1.10.0"
},
{
"status": "affected",
"version": "2.14.0"
},
{
"status": "affected",
"version": "1.1.28"
},
{
"status": "affected",
"version": "1.4.1"
},
{
"status": "affected",
"version": "2.5.1"
},
{
"status": "affected",
"version": "2.4.0"
},
{
"status": "affected",
"version": "2.6.1"
},
{
"status": "affected",
"version": "1.26.8"
},
{
"status": "affected",
"version": "1.24.1"
},
{
"status": "affected",
"version": "1.17.1"
},
{
"status": "affected",
"version": "1.29.1"
},
{
"status": "affected",
"version": "1.1.0"
},
{
"status": "affected",
"version": "1.16.0"
},
{
"status": "affected",
"version": "3.17.0"
},
{
"status": "affected",
"version": "2.19.0"
},
{
"status": "affected",
"version": "1.8.1"
}
]
}
],
"datePublic": "2023-06-13T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell BIOS contains a Signed to Unsigned Conversion Error vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to denial of service.\u003c/span\u003e\n\n"
}
],
"value": "\nDell BIOS contains a Signed to Unsigned Conversion Error vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to denial of service.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-195",
"description": "CWE-195: Signed to Unsigned Conversion Error",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-02-06T07:38:54.321Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000214780/dsa-2023-176-dell-client-bios-security-update-for-a-signed-to-unsigned-conversion-error-vulnerability"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-28063",
"datePublished": "2024-02-06T07:38:54.321Z",
"dateReserved": "2023-03-10T05:06:06.441Z",
"dateUpdated": "2024-08-02T12:30:23.947Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-32453 (GCVE-0-2023-32453)
Vulnerability from nvd – Published: 2023-08-16 19:22 – Updated: 2024-10-02 16:01
VLAI?
Summary
Dell BIOS contains an improper authentication vulnerability. A malicious user with physical access to the system may potentially exploit this vulnerability in order to modify a security-critical UEFI variable without knowledge of the BIOS administrator.
Severity ?
4.6 (Medium)
CWE
- CWE-287 - Improper Authentication
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T15:18:37.620Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000215217/dsa-2023-190-dell-client-bios"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-32453",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-02T15:56:32.291385Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-02T16:01:10.104Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "All versions"
}
]
}
],
"datePublic": "2023-08-08T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell BIOS contains an improper authentication vulnerability. A malicious user with physical access to the system may potentially exploit this vulnerability in order to modify a security-critical UEFI variable without knowledge of the BIOS administrator.\u003c/span\u003e\n\n"
}
],
"value": "\nDell BIOS contains an improper authentication vulnerability. A malicious user with physical access to the system may potentially exploit this vulnerability in order to modify a security-critical UEFI variable without knowledge of the BIOS administrator.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "LOW",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-287",
"description": "CWE-287: Improper Authentication",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-16T19:22:33.168Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000215217/dsa-2023-190-dell-client-bios"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-32453",
"datePublished": "2023-08-16T19:22:33.168Z",
"dateReserved": "2023-05-09T06:02:34.291Z",
"dateUpdated": "2024-10-02T16:01:10.104Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-28075 (GCVE-0-2023-28075)
Vulnerability from nvd – Published: 2023-08-16 19:15 – Updated: 2024-10-08 19:02
VLAI?
Summary
Dell BIOS contain a Time-of-check Time-of-use vulnerability in BIOS. A local authenticated malicious user with physical access to the system could potentially exploit this vulnerability by using a specifically timed DMA transaction during an SMI in order to gain arbitrary code execution on the system.
Severity ?
6.9 (Medium)
CWE
- CWE-367 - Time-of-check Time-of-use (TOCTOU) Race Condition
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T12:30:23.618Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212817/dsa-2023-152-security-update-for-a-dell-client-bios-vulnerability"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:o:dell:cpg_bios:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "cpg_bios",
"vendor": "dell",
"versions": [
{
"lessThan": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-28075",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T19:01:58.435016Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T19:02:39.400Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "All Versions"
}
]
}
],
"datePublic": "2023-08-08T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell BIOS contain a Time-of-check Time-of-use vulnerability in BIOS. A local authenticated malicious user with physical access to the system could potentially exploit this vulnerability by using a specifically timed DMA transaction during an SMI in order to gain arbitrary code execution on the system.\u003c/span\u003e\n\n"
}
],
"value": "\nDell BIOS contain a Time-of-check Time-of-use vulnerability in BIOS. A local authenticated malicious user with physical access to the system could potentially exploit this vulnerability by using a specifically timed DMA transaction during an SMI in order to gain arbitrary code execution on the system.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-367",
"description": "CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-16T19:15:41.959Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212817/dsa-2023-152-security-update-for-a-dell-client-bios-vulnerability"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-28075",
"datePublished": "2023-08-16T19:15:41.959Z",
"dateReserved": "2023-03-10T05:07:55.141Z",
"dateUpdated": "2024-10-08T19:02:39.400Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-46752 (GCVE-0-2022-46752)
Vulnerability from nvd – Published: 2023-03-08 16:51 – Updated: 2025-02-28 18:32
VLAI?
Summary
Dell BIOS contains an Improper Authorization vulnerability. An unauthenticated physical attacker may potentially exploit this vulnerability, leading to denial of service.
Severity ?
4.6 (Medium)
CWE
- CWE-285 - Improper Authorization
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dell | CPG BIOS |
Affected:
1.8.0
Affected: 1.19.0 Affected: 1.9.0 Affected: 2.17.0 Affected: 1.7.0 Affected: 2.16.0 Affected: 2.16.1 Affected: 1.10.0 Affected: 1.18.0 Affected: 1.14.0 Affected: 1.2.0 Affected: 1.25.1 Affected: 1.24.0 Affected: 1.8.3 Affected: 1.8.1 Affected: 1.8.2 Affected: 1.22.0 Affected: 1.17.0 Affected: 1.9.1 Affected: 1.17.1 Affected: 1.18.1 Affected: 1.16.0 Affected: 1.16.1 Affected: 1.13.1 Affected: 1.6.1 Affected: 1.4.0 Affected: 1.11.0 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T14:39:38.454Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000207928/dsa-2023-011-dell-client-platform-security-update-for-a-bios-vulnerability"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-46752",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-28T18:32:17.382642Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-02-28T18:32:37.203Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"Inspiron 14 Plus 7420",
"Inspiron 16 Plus 7620",
"Inspiron 3511",
"Inspiron 3520",
"Inspiron 5310",
"Inspiron 5320",
"Inspiron 5410",
"Inspiron 5420",
"Inspiron 5510",
"Inspiron 5620",
"Inspiron 7420",
"Inspiron 7510",
"Inspiron 7610",
"Inspiron 7620",
"Latitude 3140",
"Latitude 3320",
"Latitude 3330",
"Latitude 3420",
"Latitude 3430",
"Latitude 3520",
"Latitude 3530",
"Latitude 5330",
"Latitude 5420",
"Latitude 5430",
"Latitude 5430 Rugged",
"Latitude 5431",
"Latitude 5520",
"Latitude 5521",
"Latitude 5530",
"Latitude 5531",
"Latitude 7320",
"Latitude 7320 Detachable",
"Latitude 7330",
"Latitude 7420",
"Latitude 7430",
"Latitude 7520",
"Latitude 7530",
"Latitude 9330",
"Latitude 9420",
"Latitude 9430",
"Latitude 9510",
"Latitude 9520",
"Latitude Rugged 7330",
"Latitude 5421",
"Precision 3470",
"Precision 3560",
"Precision 3561",
"Precision 3570",
"Precision 3571",
"Precision 5470",
"Precision 5560",
"Precision 5570",
"Precision 5760",
"Precision 5770",
"Precision 7560",
"Precision 7670",
"Precision 7760",
"Precision 7770",
"Vostro 3420",
"Vostro 3510",
"Vostro 3520",
"Vostro 5310",
"Vostro 5320",
"Vostro 5410",
"Vostro 5510",
"Vostro 5620",
"Vostro 7510",
"Vostro 7620",
"XPS 13 9315",
"XPS 13 9315 2-in-1",
"XPS 13 9320",
"XPS 15 9510",
"XPS 15 9520",
"XPS 17 9710",
"XPS 17 9720"
],
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "1.8.0"
},
{
"status": "affected",
"version": "1.19.0"
},
{
"status": "affected",
"version": "1.9.0"
},
{
"status": "affected",
"version": "2.17.0"
},
{
"status": "affected",
"version": "1.7.0"
},
{
"status": "affected",
"version": "2.16.0"
},
{
"status": "affected",
"version": "2.16.1"
},
{
"status": "affected",
"version": "1.10.0"
},
{
"status": "affected",
"version": "1.18.0"
},
{
"status": "affected",
"version": "1.14.0"
},
{
"status": "affected",
"version": "1.2.0"
},
{
"status": "affected",
"version": "1.25.1"
},
{
"status": "affected",
"version": "1.24.0"
},
{
"status": "affected",
"version": "1.8.3"
},
{
"status": "affected",
"version": "1.8.1"
},
{
"status": "affected",
"version": "1.8.2"
},
{
"status": "affected",
"version": "1.22.0"
},
{
"status": "affected",
"version": "1.17.0"
},
{
"status": "affected",
"version": "1.9.1"
},
{
"status": "affected",
"version": "1.17.1"
},
{
"status": "affected",
"version": "1.18.1"
},
{
"status": "affected",
"version": "1.16.0"
},
{
"status": "affected",
"version": "1.16.1"
},
{
"status": "affected",
"version": "1.13.1"
},
{
"status": "affected",
"version": "1.6.1"
},
{
"status": "affected",
"version": "1.4.0"
},
{
"status": "affected",
"version": "1.11.0"
}
]
}
],
"datePublic": "2023-02-27T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell BIOS contains an Improper Authorization vulnerability. An unauthenticated physical attacker may potentially exploit this vulnerability, leading to denial of service.\u003c/span\u003e\n\n"
}
],
"value": "\nDell BIOS contains an Improper Authorization vulnerability. An unauthenticated physical attacker may potentially exploit this vulnerability, leading to denial of service.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-285",
"description": "CWE-285: Improper Authorization",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-03-08T16:51:55.033Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000207928/dsa-2023-011-dell-client-platform-security-update-for-a-bios-vulnerability"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2022-46752",
"datePublished": "2023-03-08T16:51:55.033Z",
"dateReserved": "2022-12-07T14:20:31.444Z",
"dateUpdated": "2025-02-28T18:32:37.203Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-32482 (GCVE-0-2022-32482)
Vulnerability from nvd – Published: 2023-02-01 05:15 – Updated: 2025-03-26 18:55
VLAI?
Summary
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with admin privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
Severity ?
5.6 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T07:39:51.051Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000205717/dsa-2022-326"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-32482",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-26T18:55:04.575746Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-26T18:55:52.431Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"lessThanOrEqual": "2.15.2",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"datePublic": "2022-12-16T17:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cdiv\u003e\u003cdiv\u003eDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with admin privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\u003c/div\u003e\u003c/div\u003e\n\n"
}
],
"value": "\nDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with admin privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\n\n\n\n\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20: Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-02-01T05:15:33.850Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000205717/dsa-2022-326"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2022-32482",
"datePublished": "2023-02-01T05:15:33.850Z",
"dateReserved": "2022-06-06T17:44:58.336Z",
"dateUpdated": "2025-03-26T18:55:52.431Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-52541 (GCVE-0-2024-52541)
Vulnerability from cvelistv5 – Published: 2025-02-19 16:46 – Updated: 2025-02-19 17:08
VLAI?
Summary
Dell Client Platform BIOS contains a Weak Authentication vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.
Severity ?
8.2 (High)
CWE
- CWE-1390 - Weak Authentication
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dell | Dell Client Platform BIOS |
Affected:
N/A , < 1.34.0
(semver)
Affected: N/A , < 1.28.0 (semver) Affected: N/A , < 1.21.0 (semver) Affected: N/A , < 1.8.0 (semver) Affected: N/A , < 1.9.0 (semver) Affected: N/A , < 1.17.0 (semver) Affected: N/A , < 1.7.0 (semver) Affected: N/A , < 1.26.0 (semver) Affected: N/A , < 1.20.0 (semver) Affected: N/A , < 1.31.1 (semver) Affected: N/A , < 1.30.0 (semver) Affected: N/A , < 1.29.0 (semver) Affected: N/A , < 1.32.0 (semver) Affected: N/A , < 1.21.1 (semver) Affected: N/A , < 1.25.1 (semver) Affected: N/A , < 1.33.0 (semver) Affected: N/A , < 1.31.0 (semver) Affected: N/A , < 2.31.0 (semver) Affected: N/A , < 2.39.0 (semver) Affected: N/A , < 2.43.0 (semver) Affected: N/A , < 1.27.0 (semver) Affected: N/A , < 1.22.0 (semver) Affected: N/A , < 1.18.0 (semver) Affected: N/A , < 2.30.0 (semver) Affected: N/A , < 1.24.0 (semver) Affected: N/A , < 1.25.0 (semver) Affected: N/A , < 1.10.0 (semver) Affected: N/A , < 1.14.0 (semver) Affected: N/A , < 1.6.1 (semver) Affected: N/A , < 1.15.1 (semver) Affected: N/A , < 1.36.1 (semver) Affected: N/A , < 1.33.1 (semver) Affected: N/A , < 1.48.0 (semver) Affected: N/A , < 1.37.0 (semver) Affected: N/A , < 1.27.1 (semver) Affected: N/A , < 1.26.1 (semver) Affected: N/A , < 1.16.0 (semver) Affected: N/A , < 1.35.1 (semver) Affected: N/A , < 1.32.1 (semver) Affected: N/A , < 1.38.0 (semver) Affected: N/A , < 1.40.0 (semver) Affected: N/A , < 1.35.0 (semver) Affected: N/A , < 1.36.0 (semver) Affected: N/A , < 1.41.0 (semver) Affected: N/A , < 1.31.2 (semver) Affected: N/A , < 1.18.1 (semver) Affected: N/A , < 1.39.0 (semver) Affected: N/A , < 1.53.0 (semver) Affected: N/A , < 1.19.1 (semver) Affected: N/A , < 1.38.1 (semver) Affected: N/A , < 1.7.1 (semver) Affected: N/A , < 1.8.1 (semver) Affected: N/A , < 1.23.0 (semver) Affected: N/A , < 1.34.1 (semver) Affected: N/A , < 1.23.2 (semver) Affected: N/A , < 1.30.1 (semver) Affected: N/A , < 2.28.1 (semver) Affected: N/A , < 2.22.1 (semver) Affected: N/A , < 1.28.1 (semver) Affected: N/A , < 1.1.44 (semver) Affected: N/A , < 3.10.0 (semver) Affected: N/A , < 1.6.0 (semver) Affected: N/A , < 2.33.0 (semver) Affected: N/A , < 2.20.0 (semver) Affected: N/A , < 2.34.0 (semver) Affected: N/A , < 1.15.0 (semver) Affected: N/A , < 1.34.8 (semver) Affected: N/A , < 1.9.1 (semver) Affected: N/A , < 2.6.1 (semver) Affected: N/A , < 01.11.02 (semver) Affected: N/A , < 2.31.1 (semver) Affected: N/A , < 3.27.1 (semver) Affected: N/A , < 2.29.1 (semver) Affected: N/A , < 2.18.1 (semver) Affected: N/A , < 1.13.0 (semver) Affected: N/A , < 1.11.0 (semver) Affected: N/A , < 1.11.1 (semver) Affected: N/A , < 2.24.1 (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-52541",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-19T17:07:39.827843Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-02-19T17:08:48.094Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"modules": [
"Alienware m15 R6",
"Alienware m15 R7",
"Alienware m16 R1",
"Alienware m16 R2",
"Alienware M18 R2",
"Alienware x14 R2",
"Alienware X16 R2",
"ChengMing 3900",
"ChengMing 3910/3911",
"ChengMing 3990",
"Dell Edge Gateway 5000",
"Dell G15 5510",
"Dell G15 5511",
"Dell G15 5530",
"Dell G5 5000",
"Dell Precision 3430 Tower",
"Dell Precision 3431 Tower",
"Dell Precision 3630 Tower",
"Dell Precision 5820 Tower",
"Dell Precision 7820 Tower",
"Embedded Box PC 5000",
"Inspiron 13 5320",
"Inspiron 13 5330",
"Inspiron 14\u00a0 5410/5418",
"Inspiron 14 5420",
"Inspiron 14 Plus 7420",
"Inspiron 14 Plus 7440",
"Inspiron 15 3530",
"Inspiron 16 5640",
"Inspiron 24 5420 All-in-One",
"Inspiron 5301",
"Inspiron 5400/5401",
"Latitude 12 Rugged Extreme 7214",
"Latitude 3190",
"Latitude 3310",
"Latitude 3310 2-In-1",
"Latitude 3340",
"Latitude 3400",
"Latitude 3410",
"Latitude 3420",
"Latitude 5320",
"Latitude 5400",
"Latitude 5401",
"Latitude 5420",
"Latitude 5430 Rugged Laptop",
"Latitude 5440",
"Latitude 5480",
"Latitude 7212 Rugged Extreme Tablet",
"Latitude 7230 Rugged Extreme",
"Latitude 7320",
"Latitude 7350 Detachable",
"Latitude 7450",
"Latitude 9330",
"Latitude 9420",
"OptiPlex 3000 Thin Client",
"OptiPlex 3070",
"OptiPlex 3080",
"OptiPlex 3090",
"OptiPlex 5080",
"OptiPlex 5400 All-In-One",
"Precision 3260 XE Compact / Precision 3260 Compact",
"Precision 3280 CFF",
"Precision 3420 Tower",
"Precision 3660",
"Precision 3930 Rack",
"Precision 5480",
"Precision 5530 2-In-1",
"Precision 5690",
"Precision 5860 Tower",
"Precision 7875 Tower",
"Vostro 3681",
"XPS 13 9310",
"XPS 13 9310 2-in-1",
"XPS 13 Plus 9320",
"XPS 13 9340",
"XPS 14 9440",
"XPS 16 9640",
"XPS 8940"
],
"product": "Dell Client Platform BIOS",
"vendor": "Dell",
"versions": [
{
"lessThan": "1.34.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.28.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.21.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.8.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.9.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.17.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.7.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.26.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.20.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.30.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.29.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.32.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.21.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.25.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.33.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.31.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.39.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.43.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.27.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.22.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.18.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.30.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.24.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.25.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.10.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.14.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.6.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.15.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.36.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.33.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.48.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.37.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.27.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.26.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.16.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.35.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.32.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.38.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.40.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.35.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.36.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.41.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.18.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.39.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.53.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.19.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.38.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.7.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.8.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.23.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.34.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.23.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.30.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.28.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.22.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.28.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.1.44",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "3.10.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.6.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.33.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.20.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.34.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.15.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.34.8",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.9.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.6.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "01.11.02",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.31.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "3.27.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.29.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.18.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.13.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.11.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.11.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.24.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
}
]
}
],
"datePublic": "2025-02-17T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dell Client Platform BIOS contains a Weak Authentication vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.\u003cbr\u003e"
}
],
"value": "Dell Client Platform BIOS contains a Weak Authentication vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-1390",
"description": "CWE-1390: Weak Authentication",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-02-19T16:46:22.803Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000258429/dsa-2025-021"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2024-52541",
"datePublished": "2025-02-19T16:46:22.803Z",
"dateReserved": "2024-11-12T06:04:07.776Z",
"dateUpdated": "2025-02-19T17:08:48.094Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-43078 (GCVE-0-2023-43078)
Vulnerability from cvelistv5 – Published: 2024-08-28 05:33 – Updated: 2024-08-28 22:31
VLAI?
Summary
Dell Dock Firmware and Dell Client Platform contain an Improper Link Resolution vulnerability during installation resulting in arbitrary folder deletion, which could lead to Privilege Escalation or Denial of Service.
Severity ?
6.7 (Medium)
CWE
- CWE-59 - Improper Link Resolution Before File Access ('Link Following')
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dell | Dell Client Platform, Dell Dock Firmware |
Affected:
N/A , < 1.27.0
(semver)
Affected: N/A , < 1.22.0 (semver) Affected: N/A , < 1.14.1 (semver) Affected: N/A , < 1.11.0 (semver) Affected: N/A , < 1.19.0 (semver) Affected: N/A , < 1.20.0 (semver) Affected: N/A , < 1.24.0 (semver) Affected: N/A , < 1.26.0 (semver) Affected: N/A , < 1.12.0 (semver) Affected: N/A , < 1.28.0 (semver) Affected: N/A , < 1.17.0 (semver) Affected: N/A , < 1.23.0 (semver) Affected: N/A , < 1.30.0 (semver) Affected: N/A , < 2.25.0 (semver) Affected: N/A , < 1.16.0 (semver) Affected: N/A , < 1.12.1 (semver) Affected: N/A , < 2.24.0 (semver) Affected: N/A , < 1.8.0 (semver) Affected: N/A , < 1.18.0 (semver) Affected: N/A , < 1.29.0 (semver) Affected: N/A , < 1.24.1 (semver) Affected: N/A , < 1.22.1 (semver) Affected: N/A , < 1.31.0 (semver) Affected: N/A , < 1.25.0 (semver) Affected: N/A , < 1.10.0 (semver) Affected: N/A , < 1.34.0 (semver) Affected: N/A , < 1.32.0 (semver) Affected: N/A , < 1.36.0 (semver) Affected: N/A , < 1.10.1 (semver) Affected: N/A , < 1.36.2 (semver) Affected: N/A , < 1.21.1 (semver) Affected: N/A , < 1.33.0 (semver) Affected: N/A , < 1.35.0 (semver) Affected: N/A , < 1.34.2 (semver) Affected: N/A , < 1.30.1 (semver) Affected: N/A , < 1.15.0 (semver) Affected: N/A , < 2.22.0 (semver) Affected: N/A , < 2.16.0 (semver) Affected: N/A , < 1.22.2 (semver) Affected: N/A , < 1.1.37 (semver) Affected: N/A , < 1.27.1 (semver) Affected: N/A , < 3.3.2 (semver) Affected: N/A , < 1.28.1 (semver) Affected: N/A , < 2.11.1 (semver) Affected: N/A , < 2.28.0 (semver) Affected: N/A , < 1.28.8 (semver) Affected: N/A , < 1.1.16 (semver) Affected: N/A , < 1.20.1 (semver) Affected: N/A , < 1.9.0 (semver) Affected: N/A , < 1.6.1 (semver) Affected: N/A , < 1.1.15 (semver) Affected: N/A , < 2.23.0 (semver) Affected: N/A , < 3.20.0 (semver) Affected: N/A , < 1.19.1 (semver) Affected: N/A , < 2.9.0 (semver) Affected: N/A , < 1.13.0 (semver) Affected: N/A , < 1.0.14.20 (semver) Affected: N/A , < 01.00.15 (semver) Affected: N/A , < 01.00.36 (semver) Affected: N/A , < 4.62.156.006 (semver) Affected: N/A , < 4.66.128.015 (semver) Affected: N/A , < 4.65.111.022 (semver) Affected: N/A , < 4.61.124.014 (semver) Affected: N/A , < 4.46.147.004 (semver) Affected: N/A , < 4.46.134.013 (semver) Affected: N/A , < 4.66.131.016 (semver) Affected: N/A , < 4.46.135.009 (semver) Affected: N/A , < 4.65.162.003 (semver) Affected: N/A , < 4.65.119.017 (semver) Affected: N/A , < 4.62.140.014 (semver) Affected: N/A , < 4.46.166.001 (semver) Affected: N/A , < 4.65.163.002 (semver) Affected: N/A , < 4.62.139.013 (semver) Affected: N/A , < 4.46.112.015 (semver) Affected: N/A , < 4.65.116.019 (semver) Affected: N/A , < 4.46.143.009 (semver) Affected: N/A , < 4.46.145.004 (semver) Affected: N/A , < 4.65.117.031 (semver) Affected: N/A , < 4.62.102.024 (semver) Affected: N/A , < 4.65.108.018 (semver) Affected: N/A , < 4.69.120.013 (semver) Affected: N/A , < 4.46.106.031 (semver) Affected: N/A , < 7.2.2.0 (semver) Affected: N/A , < 74.64 (semver) |
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:dell:wyse_5070_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3480_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3580_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3583_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3540_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3561_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7560_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7760_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7780_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7480_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5480_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_9420_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5521_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3320_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3580_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3480_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_m15_r6_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "alienware_m15_r6_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.27.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_17_9720_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:xps_13_9300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:wyse_5470_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_14_3420_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_15_3520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5570_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5080_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7070_ultra_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3120_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3310_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5310_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5310_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_15_3520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g16_7620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g15_5510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g15_5520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_m15_r7_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "alienware_m15_r7_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.22.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:alienware_m18_r1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_m16_r1_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "alienware_m16_r1_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.14.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:vostro_16_5630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3020_small_desktop_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3020_tower_desktop_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3480_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_all-in-one_7410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_micro_7010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_micro_plus_7010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_small_form_factor_7010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_small_form_factor_plus_7010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_tower_7010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_tower_plus_7010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5440_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7340_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7440_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3020_desktop_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3020_small_desktop_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_16_5630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_16_7630_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_14_5430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_14_7430_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:chengming_3911_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:chengming_3910_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_x16_r1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_x14_r2_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "alienware_x14_r2_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.11.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_13_9305_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3910_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_5620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3470_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5470_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_xe4_tower_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7000_micro_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7000_small_form_factor_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7000_tower_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7000_xe_micro_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5000_micro_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5000_small_form_factor_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5000_tower_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3000_micro_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3000_small_form_factor_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3000_tower_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3330_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5330_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5431_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3910_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_16_5620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_14_5420_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:chengming_3900_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "chengming_3900_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.19.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_15_9520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_15_7510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3471_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3671_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_7620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3571_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5570_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5531_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7330_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7530_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_9430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3671_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3471_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_16_plus_7620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_16_7610_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_15_7510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_14_plus_7420_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:chengming_3988_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "chengming_3988_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.20.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_17_9710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_5090_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5760_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3070_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5070_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7070_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7071_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_9510_2in1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7700_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5401_aio_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5401_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:chengming_3990_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:chengming_3991_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "chengming_3991_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.24.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_15_9500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_7500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3590_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_15_3510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3280_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5270_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7470_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7770_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7310_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7210_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7200_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5421_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7501_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_15_3511_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g15_5511_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "g15_5511_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.26.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_7230_rugged_extreme_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3140_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_16_plus_7630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_14_plus_7430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g16_7630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g15_5530_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "g15_5530_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.12.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_17_9700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3401_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3501_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_5402_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_5502_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3541_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_xe3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7060_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5060_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3060_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5401_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5501_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7320_detachable_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3501_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5402_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5406_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5409_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5502_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5509_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7306_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7506_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7706_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3430_tower_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g5_5500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g3_3500_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "g3_3500_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.28.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_9330_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_16_7620_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_14_7420_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g5_5000_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "g5_5000_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.17.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_13_7390_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:wyse_5470_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_5880_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3240_compact_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3440_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7080_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7330_rugged_laptop_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5430_rugged_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3310_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3431_tower_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g5_5090_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "g5_5090_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.23.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:precision_3530_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7760_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7460_all_in_one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5260_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5491_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5591_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:dell_g7_7500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:dell_g7_7700_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "dell_g7_7700_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.30.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:vostro_13_5310_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_13_5310_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3630_tower_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "precision_3630_tower_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "2.25.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:vostro_5320_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3530_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_13_5320_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_13_5320_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.16.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:inspiron_13_5330_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_13_5330_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.12.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:vostro_15_5510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_14_5410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_15_5510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_15_5518_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_14_5418_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_14_5410_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_14_5410_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "2.24.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:vostro_14_3430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_15_3530_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5480_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_9440_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_27_7720_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_24_5420_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_15_3530_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_15_3530_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.8.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:inspiron_27_7710_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_24_5410_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_24_5411_all-in-one_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_24_5411_all-in-one_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.18.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_13_7390_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7740_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7540_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7424_rugged_extreme_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5420_rugged_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5424_rugged_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5300_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3301_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5593_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3793_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3593_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_3593_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:inspiron_3881_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3880_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_3880_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.24.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:vostro_5890_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3890_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3690_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3891_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_3891_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.22.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:vostro_5301_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7730_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7530_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5290_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3190_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3190_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5301_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_5301_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.31.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_15_7590_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:xps_15_9510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5560_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5540_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3551_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7090_ultra_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3090_ultra_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_9410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7400_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5511_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5411_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3300_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_3300_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.25.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_15_9530_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5680_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3540_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3440_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3340_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_3340_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.10.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:precision_5530_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3420_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_3420_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.34.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_5590_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5290_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_5290_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.32.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:precision_3560_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5320_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_5320_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.36.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:precision_3580_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3581_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5540_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5340_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_5340_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.10.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_5420_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_5420_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.36.2",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:precision_3570_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5530_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_5530_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.21.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_rugged_7220_extreme_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7220_rugged_extreme_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_7220_rugged_extreme_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.33.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_7490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7390_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7290_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_7290_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.35.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_7520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7420_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7320_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_7320_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.34.2",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_9520_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_9520_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.30.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:optiplex_3000_thin_client_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "optiplex_3000_thin_client_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.15.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_13_9310_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3080_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "optiplex_3080_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "2.22.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_8940_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3090_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "optiplex_3090_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "2.16.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:optiplex_7090_tower_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5090_micro_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5090_small_form_factor_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5090_tower_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "optiplex_5090_tower_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.22.2",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:optiplex_7400_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5400_all-in-one_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "optiplex_5400_all-in-one_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.1.37",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:optiplex_7490_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5490_all-in-one_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "optiplex_5490_all-in-one_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.27.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:precision_3460_small_form_factor_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3460_xe_small_form_factor_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3260_compact_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3260_xe_compact_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "precision_3260_xe_compact_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "3.3.2",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:precision_3650_tower_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "precision_3650_tower_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.28.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:precision_3660_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "precision_3660_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "2.11.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-43078",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-28T14:17:19.963412Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-08-28T22:31:00.645Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Dell Client Platform, Dell Dock Firmware",
"vendor": "Dell",
"versions": [
{
"lessThan": "1.27.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.22.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.14.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.11.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.19.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.20.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.24.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.26.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.12.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.28.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.17.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.23.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.30.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.25.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.16.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.12.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.24.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.8.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.18.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.29.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.24.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.22.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.25.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.10.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.34.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.32.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.36.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.10.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.36.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.21.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.33.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.35.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.34.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.30.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.15.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.22.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.16.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.22.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.1.37",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.27.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "3.3.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.28.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.11.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.28.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.28.8",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.1.16",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.20.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.9.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.6.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.1.15",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.23.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "3.20.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.19.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.9.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.13.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.0.14.20",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "01.00.15",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "01.00.36",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.62.156.006",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.66.128.015",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.65.111.022",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.61.124.014",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.46.147.004",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.46.134.013",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.66.131.016",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.46.135.009",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.65.162.003",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.65.119.017",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.62.140.014",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.46.166.001",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.65.163.002",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.62.139.013",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.46.112.015",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.65.116.019",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.46.143.009",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.46.145.004",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.65.117.031",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.62.102.024",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.65.108.018",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.69.120.013",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.46.106.031",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "7.2.2.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "74.64",
"status": "affected",
"version": "N/A",
"versionType": "semver"
}
]
}
],
"datePublic": "2024-02-22T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dell Dock Firmware and Dell Client Platform contain an Improper Link Resolution vulnerability during installation resulting in arbitrary folder deletion, which could lead to Privilege Escalation or Denial of Service."
}
],
"value": "Dell Dock Firmware and Dell Client Platform contain an Improper Link Resolution vulnerability during installation resulting in arbitrary folder deletion, which could lead to Privilege Escalation or Denial of Service."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-59",
"description": "CWE-59: Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-28T05:33:16.899Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000217981/dsa-2023-362-security-update-for-dell-dock-firmware-and-dell-client-platform-for-an-improper-link-resolution-vulnerability"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-43078",
"datePublished": "2024-08-28T05:33:16.899Z",
"dateReserved": "2023-09-15T07:02:11.648Z",
"dateUpdated": "2024-08-28T22:31:00.645Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-0158 (GCVE-0-2024-0158)
Vulnerability from cvelistv5 – Published: 2024-07-02 06:20 – Updated: 2024-08-01 17:41
VLAI?
Summary
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with admin privileges may potentially exploit this vulnerability to modify a UEFI variable, leading to denial of service and escalation of privileges
Severity ?
5.1 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dell | CPG BIOS |
Affected:
N/A , < 1.28.0
(semver)
Affected: N/A , < 1.23.0 (semver) Affected: N/A , < 1.15.0 (semver) Affected: N/A , < 1.2.1 (semver) Affected: N/A , < 1.12.1 (semver) Affected: N/A , < 1.2.0 (semver) Affected: N/A , < 1.20.0 (semver) Affected: N/A , < 1.12.0 (semver) Affected: N/A , < 1.26.0 (semver) Affected: N/A , < 1.27.0 (semver) Affected: N/A , < 1.13.0 (semver) Affected: N/A , < 1.29.0 (semver) Affected: N/A , < 1.19.0 (semver) Affected: N/A , < 1.25.0 (semver) Affected: N/A , < 1.31.0 (semver) Affected: N/A , < 2.27.0 (semver) Affected: N/A , < 2.35.0 (semver) Affected: N/A , < 2.39.0 (semver) Affected: N/A , < 1.17.0 (semver) Affected: N/A , < 1.24.0 (semver) Affected: N/A , < 2.26.0 (semver) Affected: N/A , < 1.13.1 (semver) Affected: N/A , < 2.25.0 (semver) Affected: N/A , < 1.3.1 (semver) Affected: N/A , < 1.18.0 (semver) Affected: N/A , < 1.21.0 (semver) Affected: N/A , < 1.22.0 (semver) Affected: N/A , < 1.9.0 (semver) Affected: N/A , < 1.3.0 (semver) Affected: N/A , < 1.30.0 (semver) Affected: N/A , < 1.32.0 (semver) Affected: N/A , < 1.29..0 (semver) Affected: N/A , < 1.45.0 (semver) Affected: N/A , < 1.33.0 (semver) Affected: N/A , < 1.11.0 (semver) Affected: N/A , < 1.35.0 (semver) Affected: N/A , < 1.34.0 (semver) Affected: N/A , < 1.36.0 (semver) Affected: N/A , < 1.36.2 (semver) Affected: N/A , < 1.25.1 (semver) Affected: N/A , < 1.21.1 (semver) Affected: N/A , < 1.4.1 (semver) Affected: N/A , < 1.49.0 (semver) Affected: N/A , < 1.37.0 (semver) Affected: N/A , < 1.34.2 (semver) Affected: N/A , < 1.30.1 (semver) Affected: N/A , < 1.16.1 (semver) Affected: N/A , < 2.24.0 (semver) Affected: N/A , < 2.18.0 (semver) Affected: N/A , < 1.1.38 (semver) Affected: N/A , < 3.3.2 (semver) Affected: N/A , < 2.29.0 (semver) Affected: N/A , < 2.12.0 (semver) Affected: N/A , < 2.30.0 (semver) Affected: N/A , < 1.30.8 (semver) Affected: N/A , < 1.10.0 (semver) Affected: N/A , < 1.26.1 (semver) Affected: N/A , < 1.1.17 (semver) Affected: N/A , < 1.20.1 (semver) Affected: N/A , < 1.7.0 (semver) Affected: N/A , < 01.03.00 (semver) Affected: N/A , < 1.1.16 (semver) Affected: N/A , < 3.21.0 (semver) Affected: N/A , < 2.23.0 (semver) Affected: N/A , < 1.19.1 (semver) Affected: N/A , < 2.10.0 (semver) Affected: N/A , < 2.18.1 (semver) Affected: N/A , < 1.14.0 (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-0158",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-07-02T14:21:02.955425Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-07-02T14:21:13.009Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T17:41:16.039Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-in/000220141/dsa-2024-030-security-update-for-dell-client-bios-for-an-improper-input-validation-vulnerability"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"lessThan": "1.28.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.23.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.15.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.2.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.12.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.2.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.20.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.12.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.26.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.27.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.13.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.29.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.19.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.25.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.27.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.35.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.39.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.17.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.24.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.26.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.13.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.25.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.3.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.18.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.21.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.22.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.9.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.3.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.30.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.32.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.29..0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.45.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.33.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.11.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.35.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.34.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.36.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.36.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.25.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.21.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.4.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.49.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.37.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.34.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.30.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.16.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.24.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.18.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.1.38",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "3.3.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.29.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.12.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.30.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.30.8",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.10.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.26.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.1.17",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.20.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.7.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "01.03.00",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.1.16",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "3.21.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.23.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.19.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.10.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.18.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.14.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
}
]
}
],
"datePublic": "2024-03-12T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with admin privileges may potentially exploit this vulnerability to modify a UEFI variable, leading to denial of service and escalation of privileges"
}
],
"value": "Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with admin privileges may potentially exploit this vulnerability to modify a UEFI variable, leading to denial of service and escalation of privileges"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20: Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-07-02T06:20:44.735Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-in/000220141/dsa-2024-030-security-update-for-dell-client-bios-for-an-improper-input-validation-vulnerability"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2024-0158",
"datePublished": "2024-07-02T06:20:44.735Z",
"dateReserved": "2023-12-14T05:30:35.591Z",
"dateUpdated": "2024-08-01T17:41:16.039Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-22448 (GCVE-0-2024-22448)
Vulnerability from cvelistv5 – Published: 2024-04-10 07:30 – Updated: 2024-08-01 22:43
VLAI?
Summary
Dell BIOS contains an Out-of-Bounds Write vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to denial of service.
Severity ?
4.7 (Medium)
CWE
- CWE-787 - Out-of-bounds Write
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dell | CPG BIOS |
Affected:
N/A , < 1.29.0
(semver)
Affected: N/A , < 1.16.0 (semver) Affected: N/A , < 1.13.0 (semver) Affected: N/A , < 1.28.0 (semver) Affected: N/A , < 1.14.0 (semver) Affected: N/A , < 1.31.0 (semver) Affected: N/A , < 1.31.1 (semver) Affected: N/A , < 1.31.2 (semver) Affected: N/A , < 1.31.3 (semver) Affected: N/A , < 1.31.4 (semver) Affected: N/A , < 1.31.5 (semver) Affected: N/A , < 1.31.6 (semver) Affected: N/A , < 1.31.7 (semver) Affected: N/A , < 1.31.8 (semver) Affected: N/A , < 1.31.9 (semver) Affected: N/A , < 1.31.10 (semver) Affected: N/A , < 1.31.11 (semver) Affected: N/A , < 1.31.12 (semver) Affected: N/A , < 1.31.13 (semver) Affected: N/A , < 1.31.14 (semver) Affected: N/A , < 1.31.15 (semver) Affected: N/A , < 1.31.16 (semver) |
Credits
Dell Technologies would like to thank Eason for reporting this issue.
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:dell:alienware_16_r1:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "alienware_16_r1",
"vendor": "dell",
"versions": [
{
"lessThan": "1.13.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:dell:alienware_15_r6:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "alienware_15_r6",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:dell:alienware_18_r1:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "alienware_18_r1",
"vendor": "dell",
"versions": [
{
"lessThan": "1.16.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:dell:alienware_14_r2:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "alienware_14_r2",
"vendor": "dell",
"versions": [
{
"lessThan": "1.13.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:g15_5511:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "g15_5511",
"vendor": "dell",
"versions": [
{
"lessThan": "1.28.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:g15_5530:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "g15_5530",
"vendor": "dell",
"versions": [
{
"lessThan": "1.14.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:g16_7620:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "g16_7620",
"vendor": "dell",
"versions": [
{
"lessThan": "1.14.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:g3_3500:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "g3_3500",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:g5_5500:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "g5_5500",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:g7_7500:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "g7_7500",
"vendor": "dell",
"versions": [
{
"lessThan": "1.31.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:g7_7700:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "g7_7700",
"vendor": "dell",
"versions": [
{
"lessThan": "1.31.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:inspiron_13_5330:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "inspiron_13_5330",
"vendor": "dell",
"versions": [
{
"lessThan": "1.14.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:dell:inspiron_15_3530:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "inspiron_15_3530",
"vendor": "dell",
"versions": [
{
"lessThan": "1.10.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:dell:inspiron_3030s:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "inspiron_3030s",
"vendor": "dell",
"versions": [
{
"lessThan": "1.3.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:inspiron_5301:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "inspiron_5301",
"vendor": "dell",
"versions": [
{
"lessThan": "1.32.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:inspiron_5400:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "inspiron_5400",
"vendor": "dell",
"versions": [
{
"lessThan": "1.27.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:inspiron_5401:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "inspiron_5401",
"vendor": "dell",
"versions": [
{
"lessThan": "1.27.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:inspiron_5402:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "inspiron_5402",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:inspiron_5409:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "inspiron_5409",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:inspiron_5502:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "inspiron_5502",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:inspiron_5509:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "inspiron_5509",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:inspiron_7300:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "inspiron_7300",
"vendor": "dell",
"versions": [
{
"lessThan": "1.32.0",
"status": "affected",
"version": "-",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:inspiron_7400:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "inspiron_7400",
"vendor": "dell",
"versions": [
{
"lessThan": "1.32.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:inspiron_7700_aio:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "inspiron_7700_aio",
"vendor": "dell",
"versions": [
{
"lessThan": "1.27.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:latitude_5310:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_5310",
"vendor": "dell",
"versions": [
{
"lessThan": "1.23.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:latitude_5310_2_in_1:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_5310_2_in_1",
"vendor": "dell",
"versions": [
{
"lessThan": "1.23.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:latitude_5330:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_5330",
"vendor": "dell",
"versions": [
{
"lessThan": "1.321.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:dell:latitude_5340:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_5340",
"vendor": "dell",
"versions": [
{
"lessThan": "1.12.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:latitude_5531:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_5531",
"vendor": "dell",
"versions": [
{
"lessThan": "1.22.0",
"status": "affected",
"version": "-",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:dell:latitude_5540:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_5540",
"vendor": "dell",
"versions": [
{
"lessThan": "1.12.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:latitude_7320:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_7320",
"vendor": "dell",
"versions": [
{
"lessThan": "1.34.0",
"status": "affected",
"version": "-",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:dell:latitude_7340:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_7340",
"vendor": "dell",
"versions": [
{
"lessThan": "1.13.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:latitude_7420:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_7420",
"vendor": "dell",
"versions": [
{
"lessThan": "1.34.0",
"status": "affected",
"version": "-",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:latitude_7520:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_7520",
"vendor": "dell",
"versions": [
{
"lessThan": "1.34.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:latitude_9330:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_9330",
"vendor": "dell",
"versions": [
{
"lessThan": "1.19.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:latitude_9420:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_9420",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:latitude_9430:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_9430",
"vendor": "dell",
"versions": [
{
"lessThan": "1.22.0",
"status": "affected",
"version": "-",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:dell:latitude_9440_2in1:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_9440_2in1",
"vendor": "dell",
"versions": [
{
"lessThan": "1.10.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:optiplex_micro_7010:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "optiplex_micro_7010",
"vendor": "dell",
"versions": [
{
"lessThan": "1.13.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:optiplex_small_form_factor_7010:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "optiplex_small_form_factor_7010",
"vendor": "dell",
"versions": [
{
"lessThan": "1.13.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:optiplex_tower_7010:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "optiplex_tower_7010",
"vendor": "dell",
"versions": [
{
"lessThan": "1.13.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:precision_3440:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "precision_3440",
"vendor": "dell",
"versions": [
{
"lessThan": "1.25.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:precision_3571:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "precision_3571",
"vendor": "dell",
"versions": [
{
"lessThan": "1.22.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:dell:precision_3580:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "precision_3580",
"vendor": "dell",
"versions": [
{
"lessThan": "1.12.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:precision_3581:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "precision_3581",
"vendor": "dell",
"versions": [
{
"lessThan": "1.12.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:precision_3660:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "precision_3660",
"vendor": "dell",
"versions": [
{
"lessThan": "2.13.0",
"status": "affected",
"version": "-",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:precision_5570:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "precision_5570",
"vendor": "dell",
"versions": [
{
"lessThan": "1.22.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:precision_5750:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "precision_5750",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:precision_5770:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "precision_5770",
"vendor": "dell",
"versions": [
{
"lessThan": "1.24.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:vostro_14_3430:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "vostro_14_3430",
"vendor": "dell",
"versions": [
{
"lessThan": "1.10.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:vostro_15_3530:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "vostro_15_3530",
"vendor": "dell",
"versions": [
{
"lessThan": "1.10.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:vostro_3030s:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "vostro_3030s",
"vendor": "dell",
"versions": [
{
"lessThan": "1.3.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:vostro_5301:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "vostro_5301",
"vendor": "dell",
"versions": [
{
"lessThan": "1.32.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:vostro_5402:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "vostro_5402",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:vostro_5502:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "vostro_5502",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "-",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:vostro_5880:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "vostro_5880",
"vendor": "dell",
"versions": [
{
"lessThan": "1.25.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:xps_17_9700:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "xps_17_9700",
"vendor": "dell",
"versions": [
{
"lessThan": "1.24.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:xps_17_9730:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "xps_17_9730",
"vendor": "dell",
"versions": [
{
"lessThan": "1.11.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:xps_9315_2in1:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "xps_9315_2in1",
"vendor": "dell",
"versions": [
{
"lessThan": "1.15.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-22448",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-04-22T16:57:10.462584Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T17:52:58.050Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T22:43:34.907Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000221744/dsa-2024-066"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.16.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.13.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.28.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.14.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.3",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.4",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.5",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.6",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.7",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.8",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.9",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.10",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.11",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.12",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.13",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.14",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.15",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.16",
"status": "affected",
"version": "N/A",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Dell Technologies would like to thank Eason for reporting this issue."
}
],
"datePublic": "2024-04-09T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dell BIOS contains an Out-of-Bounds Write vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to denial of service."
}
],
"value": "Dell BIOS contains an Out-of-Bounds Write vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to denial of service."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-787",
"description": "CWE-787: Out-of-bounds Write",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-04-10T07:30:08.507Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000221744/dsa-2024-066"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2024-22448",
"datePublished": "2024-04-10T07:30:08.507Z",
"dateReserved": "2024-01-10T15:26:10.250Z",
"dateUpdated": "2024-08-01T22:43:34.907Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-48674 (GCVE-0-2023-48674)
Vulnerability from cvelistv5 – Published: 2024-03-01 12:35 – Updated: 2024-08-02 21:37
VLAI?
Summary
Dell Platform BIOS contains an Improper Null Termination vulnerability. A high privilege user with network access to the system could potentially send malicious data to the device in order to cause some services to cease to function.
Severity ?
6.8 (Medium)
CWE
- CWE-170 - Improper Null Termination
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dell | CPG BIOS |
Affected:
N/A , < 1.28.0
(semver)
Affected: N/A , < 1.27.1 (semver) Affected: N/A , < 1.24.0 (semver) Affected: N/A , < 1.12.0 (semver) Affected: N/A , < 1.32.0 (semver) Affected: N/A , < 1.26.0 (semver) Affected: N/A , < 1.27.0 (semver) Affected: N/A , < 1.11.0 (semver) Affected: N/A , < 1.20.0 (semver) Affected: N/A , < 1.9.0 (semver) Affected: N/A , < 3.20.0 (semver) Affected: N/A , < 1.17.0 (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-48674",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-03-05T19:14:09.277249Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T17:27:37.432Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T21:37:54.645Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000220410/dsa-2023-467"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"lessThan": "1.28.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.27.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.24.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.12.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.32.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.26.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.27.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.11.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.20.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.9.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "3.20.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.17.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
}
]
}
],
"datePublic": "2024-02-13T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dell Platform BIOS contains an Improper Null Termination vulnerability. A high privilege user with network access to the system could potentially send malicious data to the device in order to cause some services to cease to function."
}
],
"value": "Dell Platform BIOS contains an Improper Null Termination vulnerability. A high privilege user with network access to the system could potentially send malicious data to the device in order to cause some services to cease to function."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-170",
"description": "CWE-170: Improper Null Termination",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-03-01T12:49:58.995Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000220410/dsa-2023-467"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-48674",
"datePublished": "2024-03-01T12:35:56.866Z",
"dateReserved": "2023-11-17T06:17:23.509Z",
"dateUpdated": "2024-08-02T21:37:54.645Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-28063 (GCVE-0-2023-28063)
Vulnerability from cvelistv5 – Published: 2024-02-06 07:38 – Updated: 2024-08-02 12:30
VLAI?
Summary
Dell BIOS contains a Signed to Unsigned Conversion Error vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to denial of service.
Severity ?
6.7 (Medium)
CWE
- CWE-195 - Signed to Unsigned Conversion Error
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dell | CPG BIOS |
Affected:
1.24.0
Affected: 1.17.0 Affected: 1.13.0 Affected: 1.5.1 Affected: 1.21.0 Affected: 1.20.0 Affected: 1.23.0 Affected: 1.26.0 Affected: 1.25.0 Affected: 1.15.0 Affected: 1.12.0 Affected: 2.20.0 Affected: 1.14.0 Affected: 1.27.0 Affected: 1.19.0 Affected: 1.22.1 Affected: 2.21.0 Affected: 1.18.0 Affected: 1.7.0 Affected: 1.28.0 Affected: 1.22.0 Affected: 1.29.0 Affected: 1.30.0 Affected: 1.11.0 Affected: 1.13.1 Affected: 1.26.1 Affected: 1.13.2 Affected: 1.14.1 Affected: 1.33.0 Affected: 1.31.0 Affected: 1.12.1 Affected: 1.18.1 Affected: 1.10.0 Affected: 2.14.0 Affected: 1.1.28 Affected: 1.4.1 Affected: 2.5.1 Affected: 2.4.0 Affected: 2.6.1 Affected: 1.26.8 Affected: 1.24.1 Affected: 1.17.1 Affected: 1.29.1 Affected: 1.1.0 Affected: 1.16.0 Affected: 3.17.0 Affected: 2.19.0 Affected: 1.8.1 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-28063",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-02-06T17:07:13.502616Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-07-05T17:21:34.998Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T12:30:23.947Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000214780/dsa-2023-176-dell-client-bios-security-update-for-a-signed-to-unsigned-conversion-error-vulnerability"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "1.24.0"
},
{
"status": "affected",
"version": "1.17.0"
},
{
"status": "affected",
"version": "1.13.0"
},
{
"status": "affected",
"version": "1.5.1"
},
{
"status": "affected",
"version": "1.21.0"
},
{
"status": "affected",
"version": "1.20.0"
},
{
"status": "affected",
"version": "1.23.0"
},
{
"status": "affected",
"version": "1.26.0"
},
{
"status": "affected",
"version": "1.25.0"
},
{
"status": "affected",
"version": "1.15.0"
},
{
"status": "affected",
"version": "1.12.0"
},
{
"status": "affected",
"version": "2.20.0"
},
{
"status": "affected",
"version": "1.14.0"
},
{
"status": "affected",
"version": "1.27.0"
},
{
"status": "affected",
"version": "1.19.0"
},
{
"status": "affected",
"version": "1.22.1"
},
{
"status": "affected",
"version": "2.21.0"
},
{
"status": "affected",
"version": "1.18.0"
},
{
"status": "affected",
"version": "1.7.0"
},
{
"status": "affected",
"version": "1.28.0"
},
{
"status": "affected",
"version": "1.22.0"
},
{
"status": "affected",
"version": "1.29.0"
},
{
"status": "affected",
"version": "1.30.0"
},
{
"status": "affected",
"version": "1.11.0"
},
{
"status": "affected",
"version": "1.13.1"
},
{
"status": "affected",
"version": "1.26.1"
},
{
"status": "affected",
"version": "1.13.2"
},
{
"status": "affected",
"version": "1.14.1"
},
{
"status": "affected",
"version": "1.33.0"
},
{
"status": "affected",
"version": "1.31.0"
},
{
"status": "affected",
"version": "1.12.1"
},
{
"status": "affected",
"version": "1.18.1"
},
{
"status": "affected",
"version": "1.10.0"
},
{
"status": "affected",
"version": "2.14.0"
},
{
"status": "affected",
"version": "1.1.28"
},
{
"status": "affected",
"version": "1.4.1"
},
{
"status": "affected",
"version": "2.5.1"
},
{
"status": "affected",
"version": "2.4.0"
},
{
"status": "affected",
"version": "2.6.1"
},
{
"status": "affected",
"version": "1.26.8"
},
{
"status": "affected",
"version": "1.24.1"
},
{
"status": "affected",
"version": "1.17.1"
},
{
"status": "affected",
"version": "1.29.1"
},
{
"status": "affected",
"version": "1.1.0"
},
{
"status": "affected",
"version": "1.16.0"
},
{
"status": "affected",
"version": "3.17.0"
},
{
"status": "affected",
"version": "2.19.0"
},
{
"status": "affected",
"version": "1.8.1"
}
]
}
],
"datePublic": "2023-06-13T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell BIOS contains a Signed to Unsigned Conversion Error vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to denial of service.\u003c/span\u003e\n\n"
}
],
"value": "\nDell BIOS contains a Signed to Unsigned Conversion Error vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to denial of service.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-195",
"description": "CWE-195: Signed to Unsigned Conversion Error",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-02-06T07:38:54.321Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000214780/dsa-2023-176-dell-client-bios-security-update-for-a-signed-to-unsigned-conversion-error-vulnerability"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-28063",
"datePublished": "2024-02-06T07:38:54.321Z",
"dateReserved": "2023-03-10T05:06:06.441Z",
"dateUpdated": "2024-08-02T12:30:23.947Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-32453 (GCVE-0-2023-32453)
Vulnerability from cvelistv5 – Published: 2023-08-16 19:22 – Updated: 2024-10-02 16:01
VLAI?
Summary
Dell BIOS contains an improper authentication vulnerability. A malicious user with physical access to the system may potentially exploit this vulnerability in order to modify a security-critical UEFI variable without knowledge of the BIOS administrator.
Severity ?
4.6 (Medium)
CWE
- CWE-287 - Improper Authentication
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T15:18:37.620Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000215217/dsa-2023-190-dell-client-bios"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-32453",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-02T15:56:32.291385Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-02T16:01:10.104Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "All versions"
}
]
}
],
"datePublic": "2023-08-08T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell BIOS contains an improper authentication vulnerability. A malicious user with physical access to the system may potentially exploit this vulnerability in order to modify a security-critical UEFI variable without knowledge of the BIOS administrator.\u003c/span\u003e\n\n"
}
],
"value": "\nDell BIOS contains an improper authentication vulnerability. A malicious user with physical access to the system may potentially exploit this vulnerability in order to modify a security-critical UEFI variable without knowledge of the BIOS administrator.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "LOW",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-287",
"description": "CWE-287: Improper Authentication",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-16T19:22:33.168Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000215217/dsa-2023-190-dell-client-bios"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-32453",
"datePublished": "2023-08-16T19:22:33.168Z",
"dateReserved": "2023-05-09T06:02:34.291Z",
"dateUpdated": "2024-10-02T16:01:10.104Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-28075 (GCVE-0-2023-28075)
Vulnerability from cvelistv5 – Published: 2023-08-16 19:15 – Updated: 2024-10-08 19:02
VLAI?
Summary
Dell BIOS contain a Time-of-check Time-of-use vulnerability in BIOS. A local authenticated malicious user with physical access to the system could potentially exploit this vulnerability by using a specifically timed DMA transaction during an SMI in order to gain arbitrary code execution on the system.
Severity ?
6.9 (Medium)
CWE
- CWE-367 - Time-of-check Time-of-use (TOCTOU) Race Condition
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T12:30:23.618Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212817/dsa-2023-152-security-update-for-a-dell-client-bios-vulnerability"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:o:dell:cpg_bios:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "cpg_bios",
"vendor": "dell",
"versions": [
{
"lessThan": "*",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-28075",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T19:01:58.435016Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T19:02:39.400Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "All Versions"
}
]
}
],
"datePublic": "2023-08-08T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell BIOS contain a Time-of-check Time-of-use vulnerability in BIOS. A local authenticated malicious user with physical access to the system could potentially exploit this vulnerability by using a specifically timed DMA transaction during an SMI in order to gain arbitrary code execution on the system.\u003c/span\u003e\n\n"
}
],
"value": "\nDell BIOS contain a Time-of-check Time-of-use vulnerability in BIOS. A local authenticated malicious user with physical access to the system could potentially exploit this vulnerability by using a specifically timed DMA transaction during an SMI in order to gain arbitrary code execution on the system.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-367",
"description": "CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-16T19:15:41.959Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212817/dsa-2023-152-security-update-for-a-dell-client-bios-vulnerability"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-28075",
"datePublished": "2023-08-16T19:15:41.959Z",
"dateReserved": "2023-03-10T05:07:55.141Z",
"dateUpdated": "2024-10-08T19:02:39.400Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-46752 (GCVE-0-2022-46752)
Vulnerability from cvelistv5 – Published: 2023-03-08 16:51 – Updated: 2025-02-28 18:32
VLAI?
Summary
Dell BIOS contains an Improper Authorization vulnerability. An unauthenticated physical attacker may potentially exploit this vulnerability, leading to denial of service.
Severity ?
4.6 (Medium)
CWE
- CWE-285 - Improper Authorization
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dell | CPG BIOS |
Affected:
1.8.0
Affected: 1.19.0 Affected: 1.9.0 Affected: 2.17.0 Affected: 1.7.0 Affected: 2.16.0 Affected: 2.16.1 Affected: 1.10.0 Affected: 1.18.0 Affected: 1.14.0 Affected: 1.2.0 Affected: 1.25.1 Affected: 1.24.0 Affected: 1.8.3 Affected: 1.8.1 Affected: 1.8.2 Affected: 1.22.0 Affected: 1.17.0 Affected: 1.9.1 Affected: 1.17.1 Affected: 1.18.1 Affected: 1.16.0 Affected: 1.16.1 Affected: 1.13.1 Affected: 1.6.1 Affected: 1.4.0 Affected: 1.11.0 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T14:39:38.454Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000207928/dsa-2023-011-dell-client-platform-security-update-for-a-bios-vulnerability"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-46752",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-28T18:32:17.382642Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-02-28T18:32:37.203Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"Inspiron 14 Plus 7420",
"Inspiron 16 Plus 7620",
"Inspiron 3511",
"Inspiron 3520",
"Inspiron 5310",
"Inspiron 5320",
"Inspiron 5410",
"Inspiron 5420",
"Inspiron 5510",
"Inspiron 5620",
"Inspiron 7420",
"Inspiron 7510",
"Inspiron 7610",
"Inspiron 7620",
"Latitude 3140",
"Latitude 3320",
"Latitude 3330",
"Latitude 3420",
"Latitude 3430",
"Latitude 3520",
"Latitude 3530",
"Latitude 5330",
"Latitude 5420",
"Latitude 5430",
"Latitude 5430 Rugged",
"Latitude 5431",
"Latitude 5520",
"Latitude 5521",
"Latitude 5530",
"Latitude 5531",
"Latitude 7320",
"Latitude 7320 Detachable",
"Latitude 7330",
"Latitude 7420",
"Latitude 7430",
"Latitude 7520",
"Latitude 7530",
"Latitude 9330",
"Latitude 9420",
"Latitude 9430",
"Latitude 9510",
"Latitude 9520",
"Latitude Rugged 7330",
"Latitude 5421",
"Precision 3470",
"Precision 3560",
"Precision 3561",
"Precision 3570",
"Precision 3571",
"Precision 5470",
"Precision 5560",
"Precision 5570",
"Precision 5760",
"Precision 5770",
"Precision 7560",
"Precision 7670",
"Precision 7760",
"Precision 7770",
"Vostro 3420",
"Vostro 3510",
"Vostro 3520",
"Vostro 5310",
"Vostro 5320",
"Vostro 5410",
"Vostro 5510",
"Vostro 5620",
"Vostro 7510",
"Vostro 7620",
"XPS 13 9315",
"XPS 13 9315 2-in-1",
"XPS 13 9320",
"XPS 15 9510",
"XPS 15 9520",
"XPS 17 9710",
"XPS 17 9720"
],
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "1.8.0"
},
{
"status": "affected",
"version": "1.19.0"
},
{
"status": "affected",
"version": "1.9.0"
},
{
"status": "affected",
"version": "2.17.0"
},
{
"status": "affected",
"version": "1.7.0"
},
{
"status": "affected",
"version": "2.16.0"
},
{
"status": "affected",
"version": "2.16.1"
},
{
"status": "affected",
"version": "1.10.0"
},
{
"status": "affected",
"version": "1.18.0"
},
{
"status": "affected",
"version": "1.14.0"
},
{
"status": "affected",
"version": "1.2.0"
},
{
"status": "affected",
"version": "1.25.1"
},
{
"status": "affected",
"version": "1.24.0"
},
{
"status": "affected",
"version": "1.8.3"
},
{
"status": "affected",
"version": "1.8.1"
},
{
"status": "affected",
"version": "1.8.2"
},
{
"status": "affected",
"version": "1.22.0"
},
{
"status": "affected",
"version": "1.17.0"
},
{
"status": "affected",
"version": "1.9.1"
},
{
"status": "affected",
"version": "1.17.1"
},
{
"status": "affected",
"version": "1.18.1"
},
{
"status": "affected",
"version": "1.16.0"
},
{
"status": "affected",
"version": "1.16.1"
},
{
"status": "affected",
"version": "1.13.1"
},
{
"status": "affected",
"version": "1.6.1"
},
{
"status": "affected",
"version": "1.4.0"
},
{
"status": "affected",
"version": "1.11.0"
}
]
}
],
"datePublic": "2023-02-27T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell BIOS contains an Improper Authorization vulnerability. An unauthenticated physical attacker may potentially exploit this vulnerability, leading to denial of service.\u003c/span\u003e\n\n"
}
],
"value": "\nDell BIOS contains an Improper Authorization vulnerability. An unauthenticated physical attacker may potentially exploit this vulnerability, leading to denial of service.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-285",
"description": "CWE-285: Improper Authorization",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-03-08T16:51:55.033Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000207928/dsa-2023-011-dell-client-platform-security-update-for-a-bios-vulnerability"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2022-46752",
"datePublished": "2023-03-08T16:51:55.033Z",
"dateReserved": "2022-12-07T14:20:31.444Z",
"dateUpdated": "2025-02-28T18:32:37.203Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-32482 (GCVE-0-2022-32482)
Vulnerability from cvelistv5 – Published: 2023-02-01 05:15 – Updated: 2025-03-26 18:55
VLAI?
Summary
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with admin privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
Severity ?
5.6 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T07:39:51.051Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000205717/dsa-2022-326"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-32482",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-26T18:55:04.575746Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-26T18:55:52.431Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"lessThanOrEqual": "2.15.2",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"datePublic": "2022-12-16T17:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cdiv\u003e\u003cdiv\u003eDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with admin privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\u003c/div\u003e\u003c/div\u003e\n\n"
}
],
"value": "\nDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with admin privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\n\n\n\n\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20: Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-02-01T05:15:33.850Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000205717/dsa-2022-326"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2022-32482",
"datePublished": "2023-02-01T05:15:33.850Z",
"dateReserved": "2022-06-06T17:44:58.336Z",
"dateUpdated": "2025-03-26T18:55:52.431Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}