Search criteria
66 vulnerabilities found for precision_7865_tower_firmware by dell
CVE-2025-29989 (GCVE-0-2025-29989)
Vulnerability from nvd – Published: 2025-04-10 01:55 – Updated: 2025-04-10 14:28
VLAI?
Summary
Dell Client Platform BIOS contains a Security Version Number Mutable to Older Versions vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to BIOS upgrade denial.
Severity ?
CWE
- CWE-1328 - Security Version Number Mutable to Older Versions
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dell | Dell Client Platform BIOS |
Affected:
N/A , < 2.42.0
(semver)
Affected: N/A , < 2.46.0 (semver) Affected: N/A , < 1.18.0 (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-29989",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-10T14:24:51.147515Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-10T14:28:52.086Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Dell Client Platform BIOS",
"vendor": "Dell",
"versions": [
{
"lessThan": "2.42.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.46.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.18.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
}
]
}
],
"datePublic": "2025-04-09T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dell Client Platform BIOS contains a Security Version Number Mutable to Older Versions vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to BIOS upgrade denial.\u003cbr\u003e"
}
],
"value": "Dell Client Platform BIOS contains a Security Version Number Mutable to Older Versions vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to BIOS upgrade denial."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-1328",
"description": "CWE-1328: Security Version Number Mutable to Older Versions",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-04-10T01:55:55.597Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000250131/dsa-2025-016"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2025-29989",
"datePublished": "2025-04-10T01:55:55.597Z",
"dateReserved": "2025-03-13T05:03:56.323Z",
"dateUpdated": "2025-04-10T14:28:52.086Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-43078 (GCVE-0-2023-43078)
Vulnerability from nvd – Published: 2024-08-28 05:33 – Updated: 2024-08-28 22:31
VLAI?
Summary
Dell Dock Firmware and Dell Client Platform contain an Improper Link Resolution vulnerability during installation resulting in arbitrary folder deletion, which could lead to Privilege Escalation or Denial of Service.
Severity ?
6.7 (Medium)
CWE
- CWE-59 - Improper Link Resolution Before File Access ('Link Following')
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dell | Dell Client Platform, Dell Dock Firmware |
Affected:
N/A , < 1.27.0
(semver)
Affected: N/A , < 1.22.0 (semver) Affected: N/A , < 1.14.1 (semver) Affected: N/A , < 1.11.0 (semver) Affected: N/A , < 1.19.0 (semver) Affected: N/A , < 1.20.0 (semver) Affected: N/A , < 1.24.0 (semver) Affected: N/A , < 1.26.0 (semver) Affected: N/A , < 1.12.0 (semver) Affected: N/A , < 1.28.0 (semver) Affected: N/A , < 1.17.0 (semver) Affected: N/A , < 1.23.0 (semver) Affected: N/A , < 1.30.0 (semver) Affected: N/A , < 2.25.0 (semver) Affected: N/A , < 1.16.0 (semver) Affected: N/A , < 1.12.1 (semver) Affected: N/A , < 2.24.0 (semver) Affected: N/A , < 1.8.0 (semver) Affected: N/A , < 1.18.0 (semver) Affected: N/A , < 1.29.0 (semver) Affected: N/A , < 1.24.1 (semver) Affected: N/A , < 1.22.1 (semver) Affected: N/A , < 1.31.0 (semver) Affected: N/A , < 1.25.0 (semver) Affected: N/A , < 1.10.0 (semver) Affected: N/A , < 1.34.0 (semver) Affected: N/A , < 1.32.0 (semver) Affected: N/A , < 1.36.0 (semver) Affected: N/A , < 1.10.1 (semver) Affected: N/A , < 1.36.2 (semver) Affected: N/A , < 1.21.1 (semver) Affected: N/A , < 1.33.0 (semver) Affected: N/A , < 1.35.0 (semver) Affected: N/A , < 1.34.2 (semver) Affected: N/A , < 1.30.1 (semver) Affected: N/A , < 1.15.0 (semver) Affected: N/A , < 2.22.0 (semver) Affected: N/A , < 2.16.0 (semver) Affected: N/A , < 1.22.2 (semver) Affected: N/A , < 1.1.37 (semver) Affected: N/A , < 1.27.1 (semver) Affected: N/A , < 3.3.2 (semver) Affected: N/A , < 1.28.1 (semver) Affected: N/A , < 2.11.1 (semver) Affected: N/A , < 2.28.0 (semver) Affected: N/A , < 1.28.8 (semver) Affected: N/A , < 1.1.16 (semver) Affected: N/A , < 1.20.1 (semver) Affected: N/A , < 1.9.0 (semver) Affected: N/A , < 1.6.1 (semver) Affected: N/A , < 1.1.15 (semver) Affected: N/A , < 2.23.0 (semver) Affected: N/A , < 3.20.0 (semver) Affected: N/A , < 1.19.1 (semver) Affected: N/A , < 2.9.0 (semver) Affected: N/A , < 1.13.0 (semver) Affected: N/A , < 1.0.14.20 (semver) Affected: N/A , < 01.00.15 (semver) Affected: N/A , < 01.00.36 (semver) Affected: N/A , < 4.62.156.006 (semver) Affected: N/A , < 4.66.128.015 (semver) Affected: N/A , < 4.65.111.022 (semver) Affected: N/A , < 4.61.124.014 (semver) Affected: N/A , < 4.46.147.004 (semver) Affected: N/A , < 4.46.134.013 (semver) Affected: N/A , < 4.66.131.016 (semver) Affected: N/A , < 4.46.135.009 (semver) Affected: N/A , < 4.65.162.003 (semver) Affected: N/A , < 4.65.119.017 (semver) Affected: N/A , < 4.62.140.014 (semver) Affected: N/A , < 4.46.166.001 (semver) Affected: N/A , < 4.65.163.002 (semver) Affected: N/A , < 4.62.139.013 (semver) Affected: N/A , < 4.46.112.015 (semver) Affected: N/A , < 4.65.116.019 (semver) Affected: N/A , < 4.46.143.009 (semver) Affected: N/A , < 4.46.145.004 (semver) Affected: N/A , < 4.65.117.031 (semver) Affected: N/A , < 4.62.102.024 (semver) Affected: N/A , < 4.65.108.018 (semver) Affected: N/A , < 4.69.120.013 (semver) Affected: N/A , < 4.46.106.031 (semver) Affected: N/A , < 7.2.2.0 (semver) Affected: N/A , < 74.64 (semver) |
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:dell:wyse_5070_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3480_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3580_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3583_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3540_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3561_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7560_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7760_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7780_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7480_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5480_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_9420_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5521_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3320_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3580_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3480_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_m15_r6_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "alienware_m15_r6_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.27.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_17_9720_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:xps_13_9300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:wyse_5470_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_14_3420_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_15_3520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5570_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5080_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7070_ultra_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3120_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3310_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5310_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5310_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_15_3520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g16_7620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g15_5510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g15_5520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_m15_r7_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "alienware_m15_r7_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.22.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:alienware_m18_r1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_m16_r1_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "alienware_m16_r1_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.14.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:vostro_16_5630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3020_small_desktop_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3020_tower_desktop_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3480_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_all-in-one_7410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_micro_7010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_micro_plus_7010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_small_form_factor_7010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_small_form_factor_plus_7010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_tower_7010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_tower_plus_7010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5440_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7340_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7440_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3020_desktop_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3020_small_desktop_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_16_5630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_16_7630_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_14_5430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_14_7430_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:chengming_3911_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:chengming_3910_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_x16_r1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_x14_r2_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "alienware_x14_r2_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.11.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_13_9305_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3910_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_5620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3470_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5470_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_xe4_tower_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7000_micro_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7000_small_form_factor_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7000_tower_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7000_xe_micro_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5000_micro_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5000_small_form_factor_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5000_tower_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3000_micro_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3000_small_form_factor_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3000_tower_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3330_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5330_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5431_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3910_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_16_5620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_14_5420_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:chengming_3900_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "chengming_3900_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.19.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_15_9520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_15_7510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3471_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3671_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_7620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3571_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5570_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5531_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7330_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7530_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_9430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3671_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3471_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_16_plus_7620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_16_7610_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_15_7510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_14_plus_7420_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:chengming_3988_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "chengming_3988_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.20.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_17_9710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_5090_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5760_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3070_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5070_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7070_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7071_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_9510_2in1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7700_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5401_aio_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5401_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:chengming_3990_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:chengming_3991_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "chengming_3991_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.24.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_15_9500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_7500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3590_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_15_3510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3280_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5270_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7470_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7770_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7310_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7210_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7200_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5421_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7501_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_15_3511_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g15_5511_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "g15_5511_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.26.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_7230_rugged_extreme_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3140_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_16_plus_7630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_14_plus_7430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g16_7630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g15_5530_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "g15_5530_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.12.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_17_9700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3401_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3501_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_5402_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_5502_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3541_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_xe3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7060_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5060_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3060_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5401_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5501_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7320_detachable_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3501_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5402_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5406_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5409_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5502_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5509_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7306_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7506_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7706_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3430_tower_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g5_5500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g3_3500_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "g3_3500_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.28.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_9330_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_16_7620_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_14_7420_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g5_5000_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "g5_5000_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.17.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_13_7390_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:wyse_5470_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_5880_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3240_compact_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3440_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7080_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7330_rugged_laptop_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5430_rugged_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3310_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3431_tower_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g5_5090_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "g5_5090_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.23.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:precision_3530_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7760_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7460_all_in_one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5260_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5491_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5591_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:dell_g7_7500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:dell_g7_7700_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "dell_g7_7700_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.30.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:vostro_13_5310_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_13_5310_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3630_tower_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "precision_3630_tower_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "2.25.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:vostro_5320_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3530_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_13_5320_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_13_5320_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.16.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:inspiron_13_5330_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_13_5330_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.12.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:vostro_15_5510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_14_5410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_15_5510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_15_5518_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_14_5418_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_14_5410_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_14_5410_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "2.24.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:vostro_14_3430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_15_3530_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5480_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_9440_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_27_7720_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_24_5420_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_15_3530_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_15_3530_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.8.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:inspiron_27_7710_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_24_5410_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_24_5411_all-in-one_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_24_5411_all-in-one_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.18.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_13_7390_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7740_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7540_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7424_rugged_extreme_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5420_rugged_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5424_rugged_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5300_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3301_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5593_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3793_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3593_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_3593_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:inspiron_3881_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3880_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_3880_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.24.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:vostro_5890_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3890_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3690_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3891_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_3891_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.22.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:vostro_5301_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7730_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7530_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5290_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3190_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3190_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5301_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_5301_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.31.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_15_7590_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:xps_15_9510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5560_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5540_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3551_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7090_ultra_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3090_ultra_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_9410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7400_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5511_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5411_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3300_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_3300_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.25.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_15_9530_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5680_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3540_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3440_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3340_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_3340_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.10.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:precision_5530_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3420_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_3420_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.34.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_5590_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5290_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_5290_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.32.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:precision_3560_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5320_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_5320_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.36.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:precision_3580_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3581_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5540_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5340_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_5340_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.10.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_5420_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_5420_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.36.2",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:precision_3570_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5530_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_5530_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.21.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_rugged_7220_extreme_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7220_rugged_extreme_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_7220_rugged_extreme_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.33.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_7490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7390_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7290_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_7290_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.35.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_7520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7420_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7320_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_7320_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.34.2",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_9520_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_9520_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.30.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:optiplex_3000_thin_client_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "optiplex_3000_thin_client_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.15.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_13_9310_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3080_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "optiplex_3080_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "2.22.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_8940_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3090_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "optiplex_3090_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "2.16.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:optiplex_7090_tower_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5090_micro_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5090_small_form_factor_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5090_tower_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "optiplex_5090_tower_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.22.2",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:optiplex_7400_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5400_all-in-one_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "optiplex_5400_all-in-one_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.1.37",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:optiplex_7490_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5490_all-in-one_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "optiplex_5490_all-in-one_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.27.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:precision_3460_small_form_factor_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3460_xe_small_form_factor_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3260_compact_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3260_xe_compact_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "precision_3260_xe_compact_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "3.3.2",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:precision_3650_tower_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "precision_3650_tower_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.28.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:precision_3660_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "precision_3660_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "2.11.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-43078",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-28T14:17:19.963412Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-08-28T22:31:00.645Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Dell Client Platform, Dell Dock Firmware",
"vendor": "Dell",
"versions": [
{
"lessThan": "1.27.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.22.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.14.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.11.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.19.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.20.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.24.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.26.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.12.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.28.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.17.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.23.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.30.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.25.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.16.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.12.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.24.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.8.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.18.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.29.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.24.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.22.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.25.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.10.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.34.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.32.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.36.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.10.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.36.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.21.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.33.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.35.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.34.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.30.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.15.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.22.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.16.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.22.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.1.37",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.27.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "3.3.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.28.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.11.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.28.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.28.8",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.1.16",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.20.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.9.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.6.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.1.15",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.23.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "3.20.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.19.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.9.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.13.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.0.14.20",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "01.00.15",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "01.00.36",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.62.156.006",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.66.128.015",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.65.111.022",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.61.124.014",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.46.147.004",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.46.134.013",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.66.131.016",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.46.135.009",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.65.162.003",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.65.119.017",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.62.140.014",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.46.166.001",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.65.163.002",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.62.139.013",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.46.112.015",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.65.116.019",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.46.143.009",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.46.145.004",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.65.117.031",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.62.102.024",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.65.108.018",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.69.120.013",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.46.106.031",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "7.2.2.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "74.64",
"status": "affected",
"version": "N/A",
"versionType": "semver"
}
]
}
],
"datePublic": "2024-02-22T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dell Dock Firmware and Dell Client Platform contain an Improper Link Resolution vulnerability during installation resulting in arbitrary folder deletion, which could lead to Privilege Escalation or Denial of Service."
}
],
"value": "Dell Dock Firmware and Dell Client Platform contain an Improper Link Resolution vulnerability during installation resulting in arbitrary folder deletion, which could lead to Privilege Escalation or Denial of Service."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-59",
"description": "CWE-59: Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-28T05:33:16.899Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000217981/dsa-2023-362-security-update-for-dell-dock-firmware-and-dell-client-platform-for-an-improper-link-resolution-vulnerability"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-43078",
"datePublished": "2024-08-28T05:33:16.899Z",
"dateReserved": "2023-09-15T07:02:11.648Z",
"dateUpdated": "2024-08-28T22:31:00.645Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-0158 (GCVE-0-2024-0158)
Vulnerability from nvd – Published: 2024-07-02 06:20 – Updated: 2024-08-01 17:41
VLAI?
Summary
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with admin privileges may potentially exploit this vulnerability to modify a UEFI variable, leading to denial of service and escalation of privileges
Severity ?
5.1 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dell | CPG BIOS |
Affected:
N/A , < 1.28.0
(semver)
Affected: N/A , < 1.23.0 (semver) Affected: N/A , < 1.15.0 (semver) Affected: N/A , < 1.2.1 (semver) Affected: N/A , < 1.12.1 (semver) Affected: N/A , < 1.2.0 (semver) Affected: N/A , < 1.20.0 (semver) Affected: N/A , < 1.12.0 (semver) Affected: N/A , < 1.26.0 (semver) Affected: N/A , < 1.27.0 (semver) Affected: N/A , < 1.13.0 (semver) Affected: N/A , < 1.29.0 (semver) Affected: N/A , < 1.19.0 (semver) Affected: N/A , < 1.25.0 (semver) Affected: N/A , < 1.31.0 (semver) Affected: N/A , < 2.27.0 (semver) Affected: N/A , < 2.35.0 (semver) Affected: N/A , < 2.39.0 (semver) Affected: N/A , < 1.17.0 (semver) Affected: N/A , < 1.24.0 (semver) Affected: N/A , < 2.26.0 (semver) Affected: N/A , < 1.13.1 (semver) Affected: N/A , < 2.25.0 (semver) Affected: N/A , < 1.3.1 (semver) Affected: N/A , < 1.18.0 (semver) Affected: N/A , < 1.21.0 (semver) Affected: N/A , < 1.22.0 (semver) Affected: N/A , < 1.9.0 (semver) Affected: N/A , < 1.3.0 (semver) Affected: N/A , < 1.30.0 (semver) Affected: N/A , < 1.32.0 (semver) Affected: N/A , < 1.29..0 (semver) Affected: N/A , < 1.45.0 (semver) Affected: N/A , < 1.33.0 (semver) Affected: N/A , < 1.11.0 (semver) Affected: N/A , < 1.35.0 (semver) Affected: N/A , < 1.34.0 (semver) Affected: N/A , < 1.36.0 (semver) Affected: N/A , < 1.36.2 (semver) Affected: N/A , < 1.25.1 (semver) Affected: N/A , < 1.21.1 (semver) Affected: N/A , < 1.4.1 (semver) Affected: N/A , < 1.49.0 (semver) Affected: N/A , < 1.37.0 (semver) Affected: N/A , < 1.34.2 (semver) Affected: N/A , < 1.30.1 (semver) Affected: N/A , < 1.16.1 (semver) Affected: N/A , < 2.24.0 (semver) Affected: N/A , < 2.18.0 (semver) Affected: N/A , < 1.1.38 (semver) Affected: N/A , < 3.3.2 (semver) Affected: N/A , < 2.29.0 (semver) Affected: N/A , < 2.12.0 (semver) Affected: N/A , < 2.30.0 (semver) Affected: N/A , < 1.30.8 (semver) Affected: N/A , < 1.10.0 (semver) Affected: N/A , < 1.26.1 (semver) Affected: N/A , < 1.1.17 (semver) Affected: N/A , < 1.20.1 (semver) Affected: N/A , < 1.7.0 (semver) Affected: N/A , < 01.03.00 (semver) Affected: N/A , < 1.1.16 (semver) Affected: N/A , < 3.21.0 (semver) Affected: N/A , < 2.23.0 (semver) Affected: N/A , < 1.19.1 (semver) Affected: N/A , < 2.10.0 (semver) Affected: N/A , < 2.18.1 (semver) Affected: N/A , < 1.14.0 (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-0158",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-07-02T14:21:02.955425Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-07-02T14:21:13.009Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T17:41:16.039Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-in/000220141/dsa-2024-030-security-update-for-dell-client-bios-for-an-improper-input-validation-vulnerability"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"lessThan": "1.28.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.23.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.15.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.2.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.12.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.2.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.20.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.12.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.26.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.27.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.13.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.29.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.19.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.25.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.27.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.35.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.39.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.17.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.24.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.26.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.13.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.25.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.3.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.18.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.21.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.22.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.9.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.3.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.30.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.32.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.29..0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.45.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.33.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.11.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.35.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.34.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.36.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.36.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.25.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.21.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.4.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.49.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.37.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.34.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.30.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.16.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.24.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.18.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.1.38",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "3.3.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.29.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.12.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.30.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.30.8",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.10.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.26.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.1.17",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.20.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.7.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "01.03.00",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.1.16",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "3.21.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.23.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.19.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.10.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.18.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.14.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
}
]
}
],
"datePublic": "2024-03-12T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with admin privileges may potentially exploit this vulnerability to modify a UEFI variable, leading to denial of service and escalation of privileges"
}
],
"value": "Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with admin privileges may potentially exploit this vulnerability to modify a UEFI variable, leading to denial of service and escalation of privileges"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20: Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-07-02T06:20:44.735Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-in/000220141/dsa-2024-030-security-update-for-dell-client-bios-for-an-improper-input-validation-vulnerability"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2024-0158",
"datePublished": "2024-07-02T06:20:44.735Z",
"dateReserved": "2023-12-14T05:30:35.591Z",
"dateUpdated": "2024-08-01T17:41:16.039Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-22448 (GCVE-0-2024-22448)
Vulnerability from nvd – Published: 2024-04-10 07:30 – Updated: 2024-08-01 22:43
VLAI?
Summary
Dell BIOS contains an Out-of-Bounds Write vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to denial of service.
Severity ?
4.7 (Medium)
CWE
- CWE-787 - Out-of-bounds Write
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dell | CPG BIOS |
Affected:
N/A , < 1.29.0
(semver)
Affected: N/A , < 1.16.0 (semver) Affected: N/A , < 1.13.0 (semver) Affected: N/A , < 1.28.0 (semver) Affected: N/A , < 1.14.0 (semver) Affected: N/A , < 1.31.0 (semver) Affected: N/A , < 1.31.1 (semver) Affected: N/A , < 1.31.2 (semver) Affected: N/A , < 1.31.3 (semver) Affected: N/A , < 1.31.4 (semver) Affected: N/A , < 1.31.5 (semver) Affected: N/A , < 1.31.6 (semver) Affected: N/A , < 1.31.7 (semver) Affected: N/A , < 1.31.8 (semver) Affected: N/A , < 1.31.9 (semver) Affected: N/A , < 1.31.10 (semver) Affected: N/A , < 1.31.11 (semver) Affected: N/A , < 1.31.12 (semver) Affected: N/A , < 1.31.13 (semver) Affected: N/A , < 1.31.14 (semver) Affected: N/A , < 1.31.15 (semver) Affected: N/A , < 1.31.16 (semver) |
Credits
Dell Technologies would like to thank Eason for reporting this issue.
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:dell:alienware_16_r1:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "alienware_16_r1",
"vendor": "dell",
"versions": [
{
"lessThan": "1.13.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:dell:alienware_15_r6:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "alienware_15_r6",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:dell:alienware_18_r1:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "alienware_18_r1",
"vendor": "dell",
"versions": [
{
"lessThan": "1.16.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:dell:alienware_14_r2:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "alienware_14_r2",
"vendor": "dell",
"versions": [
{
"lessThan": "1.13.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:g15_5511:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "g15_5511",
"vendor": "dell",
"versions": [
{
"lessThan": "1.28.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:g15_5530:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "g15_5530",
"vendor": "dell",
"versions": [
{
"lessThan": "1.14.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:g16_7620:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "g16_7620",
"vendor": "dell",
"versions": [
{
"lessThan": "1.14.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:g3_3500:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "g3_3500",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:g5_5500:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "g5_5500",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:g7_7500:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "g7_7500",
"vendor": "dell",
"versions": [
{
"lessThan": "1.31.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:g7_7700:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "g7_7700",
"vendor": "dell",
"versions": [
{
"lessThan": "1.31.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:inspiron_13_5330:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "inspiron_13_5330",
"vendor": "dell",
"versions": [
{
"lessThan": "1.14.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:dell:inspiron_15_3530:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "inspiron_15_3530",
"vendor": "dell",
"versions": [
{
"lessThan": "1.10.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:dell:inspiron_3030s:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "inspiron_3030s",
"vendor": "dell",
"versions": [
{
"lessThan": "1.3.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:inspiron_5301:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "inspiron_5301",
"vendor": "dell",
"versions": [
{
"lessThan": "1.32.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:inspiron_5400:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "inspiron_5400",
"vendor": "dell",
"versions": [
{
"lessThan": "1.27.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:inspiron_5401:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "inspiron_5401",
"vendor": "dell",
"versions": [
{
"lessThan": "1.27.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:inspiron_5402:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "inspiron_5402",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:inspiron_5409:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "inspiron_5409",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:inspiron_5502:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "inspiron_5502",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:inspiron_5509:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "inspiron_5509",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:inspiron_7300:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "inspiron_7300",
"vendor": "dell",
"versions": [
{
"lessThan": "1.32.0",
"status": "affected",
"version": "-",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:inspiron_7400:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "inspiron_7400",
"vendor": "dell",
"versions": [
{
"lessThan": "1.32.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:inspiron_7700_aio:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "inspiron_7700_aio",
"vendor": "dell",
"versions": [
{
"lessThan": "1.27.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:latitude_5310:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_5310",
"vendor": "dell",
"versions": [
{
"lessThan": "1.23.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:latitude_5310_2_in_1:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_5310_2_in_1",
"vendor": "dell",
"versions": [
{
"lessThan": "1.23.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:latitude_5330:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_5330",
"vendor": "dell",
"versions": [
{
"lessThan": "1.321.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:dell:latitude_5340:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_5340",
"vendor": "dell",
"versions": [
{
"lessThan": "1.12.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:latitude_5531:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_5531",
"vendor": "dell",
"versions": [
{
"lessThan": "1.22.0",
"status": "affected",
"version": "-",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:dell:latitude_5540:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_5540",
"vendor": "dell",
"versions": [
{
"lessThan": "1.12.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:latitude_7320:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_7320",
"vendor": "dell",
"versions": [
{
"lessThan": "1.34.0",
"status": "affected",
"version": "-",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:dell:latitude_7340:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_7340",
"vendor": "dell",
"versions": [
{
"lessThan": "1.13.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:latitude_7420:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_7420",
"vendor": "dell",
"versions": [
{
"lessThan": "1.34.0",
"status": "affected",
"version": "-",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:latitude_7520:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_7520",
"vendor": "dell",
"versions": [
{
"lessThan": "1.34.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:latitude_9330:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_9330",
"vendor": "dell",
"versions": [
{
"lessThan": "1.19.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:latitude_9420:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_9420",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:latitude_9430:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_9430",
"vendor": "dell",
"versions": [
{
"lessThan": "1.22.0",
"status": "affected",
"version": "-",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:dell:latitude_9440_2in1:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_9440_2in1",
"vendor": "dell",
"versions": [
{
"lessThan": "1.10.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:optiplex_micro_7010:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "optiplex_micro_7010",
"vendor": "dell",
"versions": [
{
"lessThan": "1.13.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:optiplex_small_form_factor_7010:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "optiplex_small_form_factor_7010",
"vendor": "dell",
"versions": [
{
"lessThan": "1.13.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:optiplex_tower_7010:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "optiplex_tower_7010",
"vendor": "dell",
"versions": [
{
"lessThan": "1.13.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:precision_3440:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "precision_3440",
"vendor": "dell",
"versions": [
{
"lessThan": "1.25.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:precision_3571:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "precision_3571",
"vendor": "dell",
"versions": [
{
"lessThan": "1.22.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:dell:precision_3580:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "precision_3580",
"vendor": "dell",
"versions": [
{
"lessThan": "1.12.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:precision_3581:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "precision_3581",
"vendor": "dell",
"versions": [
{
"lessThan": "1.12.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:precision_3660:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "precision_3660",
"vendor": "dell",
"versions": [
{
"lessThan": "2.13.0",
"status": "affected",
"version": "-",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:precision_5570:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "precision_5570",
"vendor": "dell",
"versions": [
{
"lessThan": "1.22.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:precision_5750:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "precision_5750",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:precision_5770:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "precision_5770",
"vendor": "dell",
"versions": [
{
"lessThan": "1.24.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:vostro_14_3430:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "vostro_14_3430",
"vendor": "dell",
"versions": [
{
"lessThan": "1.10.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:vostro_15_3530:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "vostro_15_3530",
"vendor": "dell",
"versions": [
{
"lessThan": "1.10.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:vostro_3030s:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "vostro_3030s",
"vendor": "dell",
"versions": [
{
"lessThan": "1.3.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:vostro_5301:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "vostro_5301",
"vendor": "dell",
"versions": [
{
"lessThan": "1.32.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:vostro_5402:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "vostro_5402",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:vostro_5502:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "vostro_5502",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "-",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:vostro_5880:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "vostro_5880",
"vendor": "dell",
"versions": [
{
"lessThan": "1.25.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:xps_17_9700:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "xps_17_9700",
"vendor": "dell",
"versions": [
{
"lessThan": "1.24.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:xps_17_9730:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "xps_17_9730",
"vendor": "dell",
"versions": [
{
"lessThan": "1.11.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:xps_9315_2in1:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "xps_9315_2in1",
"vendor": "dell",
"versions": [
{
"lessThan": "1.15.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-22448",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-04-22T16:57:10.462584Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T17:52:58.050Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T22:43:34.907Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000221744/dsa-2024-066"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.16.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.13.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.28.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.14.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.3",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.4",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.5",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.6",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.7",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.8",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.9",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.10",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.11",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.12",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.13",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.14",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.15",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.16",
"status": "affected",
"version": "N/A",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Dell Technologies would like to thank Eason for reporting this issue."
}
],
"datePublic": "2024-04-09T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dell BIOS contains an Out-of-Bounds Write vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to denial of service."
}
],
"value": "Dell BIOS contains an Out-of-Bounds Write vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to denial of service."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-787",
"description": "CWE-787: Out-of-bounds Write",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-04-10T07:30:08.507Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000221744/dsa-2024-066"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2024-22448",
"datePublished": "2024-04-10T07:30:08.507Z",
"dateReserved": "2024-01-10T15:26:10.250Z",
"dateUpdated": "2024-08-01T22:43:34.907Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-28063 (GCVE-0-2023-28063)
Vulnerability from nvd – Published: 2024-02-06 07:38 – Updated: 2024-08-02 12:30
VLAI?
Summary
Dell BIOS contains a Signed to Unsigned Conversion Error vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to denial of service.
Severity ?
6.7 (Medium)
CWE
- CWE-195 - Signed to Unsigned Conversion Error
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dell | CPG BIOS |
Affected:
1.24.0
Affected: 1.17.0 Affected: 1.13.0 Affected: 1.5.1 Affected: 1.21.0 Affected: 1.20.0 Affected: 1.23.0 Affected: 1.26.0 Affected: 1.25.0 Affected: 1.15.0 Affected: 1.12.0 Affected: 2.20.0 Affected: 1.14.0 Affected: 1.27.0 Affected: 1.19.0 Affected: 1.22.1 Affected: 2.21.0 Affected: 1.18.0 Affected: 1.7.0 Affected: 1.28.0 Affected: 1.22.0 Affected: 1.29.0 Affected: 1.30.0 Affected: 1.11.0 Affected: 1.13.1 Affected: 1.26.1 Affected: 1.13.2 Affected: 1.14.1 Affected: 1.33.0 Affected: 1.31.0 Affected: 1.12.1 Affected: 1.18.1 Affected: 1.10.0 Affected: 2.14.0 Affected: 1.1.28 Affected: 1.4.1 Affected: 2.5.1 Affected: 2.4.0 Affected: 2.6.1 Affected: 1.26.8 Affected: 1.24.1 Affected: 1.17.1 Affected: 1.29.1 Affected: 1.1.0 Affected: 1.16.0 Affected: 3.17.0 Affected: 2.19.0 Affected: 1.8.1 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-28063",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-02-06T17:07:13.502616Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-07-05T17:21:34.998Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T12:30:23.947Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000214780/dsa-2023-176-dell-client-bios-security-update-for-a-signed-to-unsigned-conversion-error-vulnerability"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "1.24.0"
},
{
"status": "affected",
"version": "1.17.0"
},
{
"status": "affected",
"version": "1.13.0"
},
{
"status": "affected",
"version": "1.5.1"
},
{
"status": "affected",
"version": "1.21.0"
},
{
"status": "affected",
"version": "1.20.0"
},
{
"status": "affected",
"version": "1.23.0"
},
{
"status": "affected",
"version": "1.26.0"
},
{
"status": "affected",
"version": "1.25.0"
},
{
"status": "affected",
"version": "1.15.0"
},
{
"status": "affected",
"version": "1.12.0"
},
{
"status": "affected",
"version": "2.20.0"
},
{
"status": "affected",
"version": "1.14.0"
},
{
"status": "affected",
"version": "1.27.0"
},
{
"status": "affected",
"version": "1.19.0"
},
{
"status": "affected",
"version": "1.22.1"
},
{
"status": "affected",
"version": "2.21.0"
},
{
"status": "affected",
"version": "1.18.0"
},
{
"status": "affected",
"version": "1.7.0"
},
{
"status": "affected",
"version": "1.28.0"
},
{
"status": "affected",
"version": "1.22.0"
},
{
"status": "affected",
"version": "1.29.0"
},
{
"status": "affected",
"version": "1.30.0"
},
{
"status": "affected",
"version": "1.11.0"
},
{
"status": "affected",
"version": "1.13.1"
},
{
"status": "affected",
"version": "1.26.1"
},
{
"status": "affected",
"version": "1.13.2"
},
{
"status": "affected",
"version": "1.14.1"
},
{
"status": "affected",
"version": "1.33.0"
},
{
"status": "affected",
"version": "1.31.0"
},
{
"status": "affected",
"version": "1.12.1"
},
{
"status": "affected",
"version": "1.18.1"
},
{
"status": "affected",
"version": "1.10.0"
},
{
"status": "affected",
"version": "2.14.0"
},
{
"status": "affected",
"version": "1.1.28"
},
{
"status": "affected",
"version": "1.4.1"
},
{
"status": "affected",
"version": "2.5.1"
},
{
"status": "affected",
"version": "2.4.0"
},
{
"status": "affected",
"version": "2.6.1"
},
{
"status": "affected",
"version": "1.26.8"
},
{
"status": "affected",
"version": "1.24.1"
},
{
"status": "affected",
"version": "1.17.1"
},
{
"status": "affected",
"version": "1.29.1"
},
{
"status": "affected",
"version": "1.1.0"
},
{
"status": "affected",
"version": "1.16.0"
},
{
"status": "affected",
"version": "3.17.0"
},
{
"status": "affected",
"version": "2.19.0"
},
{
"status": "affected",
"version": "1.8.1"
}
]
}
],
"datePublic": "2023-06-13T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell BIOS contains a Signed to Unsigned Conversion Error vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to denial of service.\u003c/span\u003e\n\n"
}
],
"value": "\nDell BIOS contains a Signed to Unsigned Conversion Error vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to denial of service.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-195",
"description": "CWE-195: Signed to Unsigned Conversion Error",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-02-06T07:38:54.321Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000214780/dsa-2023-176-dell-client-bios-security-update-for-a-signed-to-unsigned-conversion-error-vulnerability"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-28063",
"datePublished": "2024-02-06T07:38:54.321Z",
"dateReserved": "2023-03-10T05:06:06.441Z",
"dateUpdated": "2024-08-02T12:30:23.947Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-43088 (GCVE-0-2023-43088)
Vulnerability from nvd – Published: 2023-12-22 18:00 – Updated: 2024-08-02 19:37
VLAI?
Summary
Dell Client BIOS contains a pre-boot direct memory access (DMA) vulnerability. An authenticated attacker with physical access to the system may potentially exploit this vulnerability in order to execute arbitrary code on the device.
Severity ?
7.2 (High)
CWE
- CWE-16 - Configuration
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T19:37:23.719Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000218223/dsa-2023-377"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"Precision 7865 Tower"
],
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "Versions prior to 1.5.0"
}
]
}
],
"datePublic": "2023-12-19T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell Client BIOS contains a pre-boot direct memory access (DMA) vulnerability. An authenticated attacker with physical access to the system may potentially exploit this vulnerability in order to execute arbitrary code on the device.\u003c/span\u003e\n\n"
}
],
"value": "\nDell Client BIOS contains a pre-boot direct memory access (DMA) vulnerability. An authenticated attacker with physical access to the system may potentially exploit this vulnerability in order to execute arbitrary code on the device.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-16",
"description": "CWE-16: Configuration",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-12-22T18:00:38.953Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000218223/dsa-2023-377"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-43088",
"datePublished": "2023-12-22T18:00:38.953Z",
"dateReserved": "2023-09-15T07:03:52.367Z",
"dateUpdated": "2024-08-02T19:37:23.719Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-28060 (GCVE-0-2023-28060)
Vulnerability from nvd – Published: 2023-06-23 10:17 – Updated: 2024-11-07 21:26
VLAI?
Summary
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
Severity ?
5.1 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T12:30:22.781Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-28060",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-07T21:26:23.822877Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-07T21:26:38.861Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "All Versions"
}
]
}
],
"datePublic": "2023-06-14T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\u003c/span\u003e\n\n"
}
],
"value": "\nDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20: Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-06-23T10:17:46.249Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-28060",
"datePublished": "2023-06-23T10:17:46.249Z",
"dateReserved": "2023-03-10T05:01:55.232Z",
"dateUpdated": "2024-11-07T21:26:38.861Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-28058 (GCVE-0-2023-28058)
Vulnerability from nvd – Published: 2023-06-23 10:30 – Updated: 2024-11-07 21:07
VLAI?
Summary
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
Severity ?
5.1 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T12:30:23.586Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-28058",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-07T21:06:57.836824Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-07T21:07:06.911Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "All Versions"
}
]
}
],
"datePublic": "2023-06-14T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\u003c/span\u003e\n\n"
}
],
"value": "\nDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20: Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-06-23T10:30:27.581Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-28058",
"datePublished": "2023-06-23T10:30:27.581Z",
"dateReserved": "2023-03-10T05:01:55.232Z",
"dateUpdated": "2024-11-07T21:07:06.911Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-28050 (GCVE-0-2023-28050)
Vulnerability from nvd – Published: 2023-06-23 10:25 – Updated: 2024-11-07 21:09
VLAI?
Summary
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
Severity ?
5.1 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T12:30:22.772Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-28050",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-07T21:07:21.607702Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-07T21:09:09.993Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "All Versions"
}
]
}
],
"datePublic": "2023-06-14T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\u003c/span\u003e\n\n"
}
],
"value": "\nDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20: Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-06-23T10:25:56.877Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-28050",
"datePublished": "2023-06-23T10:25:56.877Z",
"dateReserved": "2023-03-10T05:01:43.871Z",
"dateUpdated": "2024-11-07T21:09:09.993Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-28044 (GCVE-0-2023-28044)
Vulnerability from nvd – Published: 2023-06-23 10:20 – Updated: 2024-11-07 21:09
VLAI?
Summary
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
Severity ?
5.1 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T12:30:22.690Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-28044",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-07T21:09:18.405245Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-07T21:09:31.489Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "All Versions"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\u003c/span\u003e\n\n"
}
],
"value": "\nDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20: Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-06-23T10:20:01.132Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-28044",
"datePublished": "2023-06-23T10:20:01.132Z",
"dateReserved": "2023-03-10T04:59:39.426Z",
"dateUpdated": "2024-11-07T21:09:31.489Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-28036 (GCVE-0-2023-28036)
Vulnerability from nvd – Published: 2023-06-23 10:01 – Updated: 2024-11-08 14:08
VLAI?
Summary
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
Severity ?
5.1 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T12:23:30.885Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-28036",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-08T14:00:35.226875Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-08T14:08:38.079Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "All Versions"
}
]
}
],
"datePublic": "2023-06-14T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\u003c/span\u003e\n\n"
}
],
"value": "\nDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20: Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-06-23T10:02:03.689Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-28036",
"datePublished": "2023-06-23T10:01:57.598Z",
"dateReserved": "2023-03-10T04:59:39.425Z",
"dateUpdated": "2024-11-08T14:08:38.079Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-28034 (GCVE-0-2023-28034)
Vulnerability from nvd – Published: 2023-06-23 10:08 – Updated: 2024-11-07 21:47
VLAI?
Summary
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
Severity ?
5.1 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T12:23:30.888Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-28034",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-07T21:47:05.414975Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-07T21:47:18.534Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "All Versions"
}
]
}
],
"datePublic": "2023-06-14T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\u003c/span\u003e\n\n"
}
],
"value": "\nDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20: Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-06-23T10:08:23.429Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-28034",
"datePublished": "2023-06-23T10:08:23.429Z",
"dateReserved": "2023-03-10T04:57:40.871Z",
"dateUpdated": "2024-11-07T21:47:18.534Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-28031 (GCVE-0-2023-28031)
Vulnerability from nvd – Published: 2023-06-23 10:11 – Updated: 2024-11-07 21:36
VLAI?
Summary
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
Severity ?
5.1 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T12:23:30.885Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-28031",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-07T21:32:31.275061Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-07T21:36:15.086Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "All Versions"
}
]
}
],
"datePublic": "2023-06-14T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\u003c/span\u003e\n\n"
}
],
"value": "\nDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20: Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-06-23T10:11:12.555Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-28031",
"datePublished": "2023-06-23T10:11:12.555Z",
"dateReserved": "2023-03-10T04:57:40.871Z",
"dateUpdated": "2024-11-07T21:36:15.086Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-28027 (GCVE-0-2023-28027)
Vulnerability from nvd – Published: 2023-06-23 10:04 – Updated: 2024-11-08 14:08
VLAI?
Summary
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
Severity ?
5.1 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T12:23:30.799Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-28027",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-08T14:00:31.033659Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-08T14:08:55.284Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "All Versions"
}
]
}
],
"datePublic": "2023-06-14T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\u003c/span\u003e\n\n"
}
],
"value": "\nDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20: Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-06-23T10:04:42.451Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-28027",
"datePublished": "2023-06-23T10:04:42.451Z",
"dateReserved": "2023-03-10T04:57:40.870Z",
"dateUpdated": "2024-11-08T14:08:55.284Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-28026 (GCVE-0-2023-28026)
Vulnerability from nvd – Published: 2023-06-23 10:23 – Updated: 2024-12-04 14:43
VLAI?
Summary
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
Severity ?
5.1 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T12:23:30.812Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-28026",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-12-04T14:43:48.808973Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-12-04T14:43:58.513Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "All Versions"
}
]
}
],
"datePublic": "2023-06-14T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\u003c/span\u003e\n\n"
}
],
"value": "\nDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20: Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-06-23T10:23:05.908Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-28026",
"datePublished": "2023-06-23T10:23:05.908Z",
"dateReserved": "2023-03-10T04:57:40.870Z",
"dateUpdated": "2024-12-04T14:43:58.513Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-25938 (GCVE-0-2023-25938)
Vulnerability from nvd – Published: 2023-06-23 10:13 – Updated: 2024-11-07 21:31
VLAI?
Summary
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
Severity ?
5.1 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T11:39:06.884Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-25938",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-07T21:31:27.802986Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-07T21:31:46.930Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "All Versions"
}
]
}
],
"datePublic": "2023-06-14T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\u003c/span\u003e\n\n"
}
],
"value": "\nDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20: Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-06-23T10:13:31.571Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-25938",
"datePublished": "2023-06-23T10:13:31.571Z",
"dateReserved": "2023-02-17T06:15:08.303Z",
"dateUpdated": "2024-11-07T21:31:46.930Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-28061 (GCVE-0-2023-28061)
Vulnerability from nvd – Published: 2023-06-23 09:19 – Updated: 2024-11-08 16:51
VLAI?
Summary
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
Severity ?
5.1 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T12:30:22.777Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-28061",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-08T16:50:16.282690Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-08T16:51:02.127Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "All Versions"
}
]
}
],
"datePublic": "2023-06-14T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\u003c/span\u003e\n\n"
}
],
"value": "\nDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20: Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-06-23T09:19:23.540Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-28061",
"datePublished": "2023-06-23T09:19:23.540Z",
"dateReserved": "2023-03-10T05:06:06.441Z",
"dateUpdated": "2024-11-08T16:51:02.127Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-28059 (GCVE-0-2023-28059)
Vulnerability from nvd – Published: 2023-06-23 09:16 – Updated: 2024-11-08 15:14
VLAI?
Summary
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
Severity ?
5.1 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T12:30:23.557Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-28059",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-08T15:13:16.770402Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-08T15:14:26.292Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "All Versions"
}
]
}
],
"datePublic": "2023-06-14T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\u003c/span\u003e\n\n"
}
],
"value": "\nDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20: Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-06-23T09:16:20.837Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-28059",
"datePublished": "2023-06-23T09:16:20.837Z",
"dateReserved": "2023-03-10T05:01:55.232Z",
"dateUpdated": "2024-11-08T15:14:26.292Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-28056 (GCVE-0-2023-28056)
Vulnerability from nvd – Published: 2023-06-23 09:46 – Updated: 2024-11-08 14:06
VLAI?
Summary
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
Severity ?
5.1 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T12:30:23.978Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-28056",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-08T14:00:59.209212Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-08T14:06:52.468Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "All Versions"
}
]
}
],
"datePublic": "2023-06-14T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\u003c/span\u003e\n\n"
}
],
"value": "\nDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20: Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-06-23T09:46:19.830Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-28056",
"datePublished": "2023-06-23T09:46:19.830Z",
"dateReserved": "2023-03-10T05:01:55.232Z",
"dateUpdated": "2024-11-08T14:06:52.468Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-29989 (GCVE-0-2025-29989)
Vulnerability from cvelistv5 – Published: 2025-04-10 01:55 – Updated: 2025-04-10 14:28
VLAI?
Summary
Dell Client Platform BIOS contains a Security Version Number Mutable to Older Versions vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to BIOS upgrade denial.
Severity ?
CWE
- CWE-1328 - Security Version Number Mutable to Older Versions
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dell | Dell Client Platform BIOS |
Affected:
N/A , < 2.42.0
(semver)
Affected: N/A , < 2.46.0 (semver) Affected: N/A , < 1.18.0 (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-29989",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-10T14:24:51.147515Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-10T14:28:52.086Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Dell Client Platform BIOS",
"vendor": "Dell",
"versions": [
{
"lessThan": "2.42.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.46.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.18.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
}
]
}
],
"datePublic": "2025-04-09T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dell Client Platform BIOS contains a Security Version Number Mutable to Older Versions vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to BIOS upgrade denial.\u003cbr\u003e"
}
],
"value": "Dell Client Platform BIOS contains a Security Version Number Mutable to Older Versions vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to BIOS upgrade denial."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-1328",
"description": "CWE-1328: Security Version Number Mutable to Older Versions",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-04-10T01:55:55.597Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000250131/dsa-2025-016"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2025-29989",
"datePublished": "2025-04-10T01:55:55.597Z",
"dateReserved": "2025-03-13T05:03:56.323Z",
"dateUpdated": "2025-04-10T14:28:52.086Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-43078 (GCVE-0-2023-43078)
Vulnerability from cvelistv5 – Published: 2024-08-28 05:33 – Updated: 2024-08-28 22:31
VLAI?
Summary
Dell Dock Firmware and Dell Client Platform contain an Improper Link Resolution vulnerability during installation resulting in arbitrary folder deletion, which could lead to Privilege Escalation or Denial of Service.
Severity ?
6.7 (Medium)
CWE
- CWE-59 - Improper Link Resolution Before File Access ('Link Following')
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dell | Dell Client Platform, Dell Dock Firmware |
Affected:
N/A , < 1.27.0
(semver)
Affected: N/A , < 1.22.0 (semver) Affected: N/A , < 1.14.1 (semver) Affected: N/A , < 1.11.0 (semver) Affected: N/A , < 1.19.0 (semver) Affected: N/A , < 1.20.0 (semver) Affected: N/A , < 1.24.0 (semver) Affected: N/A , < 1.26.0 (semver) Affected: N/A , < 1.12.0 (semver) Affected: N/A , < 1.28.0 (semver) Affected: N/A , < 1.17.0 (semver) Affected: N/A , < 1.23.0 (semver) Affected: N/A , < 1.30.0 (semver) Affected: N/A , < 2.25.0 (semver) Affected: N/A , < 1.16.0 (semver) Affected: N/A , < 1.12.1 (semver) Affected: N/A , < 2.24.0 (semver) Affected: N/A , < 1.8.0 (semver) Affected: N/A , < 1.18.0 (semver) Affected: N/A , < 1.29.0 (semver) Affected: N/A , < 1.24.1 (semver) Affected: N/A , < 1.22.1 (semver) Affected: N/A , < 1.31.0 (semver) Affected: N/A , < 1.25.0 (semver) Affected: N/A , < 1.10.0 (semver) Affected: N/A , < 1.34.0 (semver) Affected: N/A , < 1.32.0 (semver) Affected: N/A , < 1.36.0 (semver) Affected: N/A , < 1.10.1 (semver) Affected: N/A , < 1.36.2 (semver) Affected: N/A , < 1.21.1 (semver) Affected: N/A , < 1.33.0 (semver) Affected: N/A , < 1.35.0 (semver) Affected: N/A , < 1.34.2 (semver) Affected: N/A , < 1.30.1 (semver) Affected: N/A , < 1.15.0 (semver) Affected: N/A , < 2.22.0 (semver) Affected: N/A , < 2.16.0 (semver) Affected: N/A , < 1.22.2 (semver) Affected: N/A , < 1.1.37 (semver) Affected: N/A , < 1.27.1 (semver) Affected: N/A , < 3.3.2 (semver) Affected: N/A , < 1.28.1 (semver) Affected: N/A , < 2.11.1 (semver) Affected: N/A , < 2.28.0 (semver) Affected: N/A , < 1.28.8 (semver) Affected: N/A , < 1.1.16 (semver) Affected: N/A , < 1.20.1 (semver) Affected: N/A , < 1.9.0 (semver) Affected: N/A , < 1.6.1 (semver) Affected: N/A , < 1.1.15 (semver) Affected: N/A , < 2.23.0 (semver) Affected: N/A , < 3.20.0 (semver) Affected: N/A , < 1.19.1 (semver) Affected: N/A , < 2.9.0 (semver) Affected: N/A , < 1.13.0 (semver) Affected: N/A , < 1.0.14.20 (semver) Affected: N/A , < 01.00.15 (semver) Affected: N/A , < 01.00.36 (semver) Affected: N/A , < 4.62.156.006 (semver) Affected: N/A , < 4.66.128.015 (semver) Affected: N/A , < 4.65.111.022 (semver) Affected: N/A , < 4.61.124.014 (semver) Affected: N/A , < 4.46.147.004 (semver) Affected: N/A , < 4.46.134.013 (semver) Affected: N/A , < 4.66.131.016 (semver) Affected: N/A , < 4.46.135.009 (semver) Affected: N/A , < 4.65.162.003 (semver) Affected: N/A , < 4.65.119.017 (semver) Affected: N/A , < 4.62.140.014 (semver) Affected: N/A , < 4.46.166.001 (semver) Affected: N/A , < 4.65.163.002 (semver) Affected: N/A , < 4.62.139.013 (semver) Affected: N/A , < 4.46.112.015 (semver) Affected: N/A , < 4.65.116.019 (semver) Affected: N/A , < 4.46.143.009 (semver) Affected: N/A , < 4.46.145.004 (semver) Affected: N/A , < 4.65.117.031 (semver) Affected: N/A , < 4.62.102.024 (semver) Affected: N/A , < 4.65.108.018 (semver) Affected: N/A , < 4.69.120.013 (semver) Affected: N/A , < 4.46.106.031 (semver) Affected: N/A , < 7.2.2.0 (semver) Affected: N/A , < 74.64 (semver) |
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:dell:wyse_5070_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3480_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3580_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3583_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3540_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3561_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7560_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7760_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7780_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7480_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5480_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_9420_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5521_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3320_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3580_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3480_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_m15_r6_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "alienware_m15_r6_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.27.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_17_9720_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:xps_13_9300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:wyse_5470_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_14_3420_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_15_3520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5570_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5080_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7070_ultra_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3120_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3310_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5310_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5310_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_15_3520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g16_7620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g15_5510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g15_5520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_m15_r7_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "alienware_m15_r7_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.22.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:alienware_m18_r1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_m16_r1_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "alienware_m16_r1_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.14.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:vostro_16_5630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3020_small_desktop_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3020_tower_desktop_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3480_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_all-in-one_7410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_micro_7010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_micro_plus_7010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_small_form_factor_7010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_small_form_factor_plus_7010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_tower_7010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_tower_plus_7010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5440_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7340_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7440_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3020_desktop_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3020_small_desktop_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_16_5630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_16_7630_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_14_5430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_14_7430_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:chengming_3911_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:chengming_3910_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_x16_r1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:alienware_x14_r2_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "alienware_x14_r2_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.11.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_13_9305_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3910_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_5620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3470_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5470_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_xe4_tower_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7000_micro_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7000_small_form_factor_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7000_tower_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7000_xe_micro_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5000_micro_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5000_small_form_factor_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5000_tower_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3000_micro_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3000_small_form_factor_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3000_tower_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3330_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5330_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5431_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3910_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_16_5620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_14_5420_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:chengming_3900_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "chengming_3900_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.19.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_15_9520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_15_7510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3471_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3671_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_7620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3571_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5570_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5531_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7330_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7530_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_9430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3671_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3471_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_16_plus_7620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_16_7610_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_15_7510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_14_plus_7420_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:chengming_3988_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "chengming_3988_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.20.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_17_9710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_5090_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5760_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3070_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5070_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7070_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7071_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_9510_2in1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7700_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5401_aio_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5401_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:chengming_3990_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:chengming_3991_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "chengming_3991_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.24.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_15_9500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_7500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3590_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_15_3510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3280_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5270_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7470_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7770_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7310_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7210_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7200_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5421_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7501_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_15_3511_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g15_5511_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "g15_5511_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.26.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_7230_rugged_extreme_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3140_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_16_plus_7630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_14_plus_7430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g16_7630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g15_5530_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "g15_5530_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.12.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_17_9700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3401_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3501_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_5402_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_5502_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3541_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_xe3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7060_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5060_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3060_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5401_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5501_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7320_detachable_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3501_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5402_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5406_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5409_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5502_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5509_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7306_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7506_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7706_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3430_tower_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g5_5500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g3_3500_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "g3_3500_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.28.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_9330_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_16_7620_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_14_7420_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g5_5000_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "g5_5000_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.17.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_13_7390_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:wyse_5470_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_5880_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3240_compact_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3440_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7080_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7330_rugged_laptop_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5430_rugged_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3310_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3431_tower_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:g5_5090_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "g5_5090_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.23.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:precision_3530_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7760_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7460_all_in_one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5260_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5491_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5591_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:dell_g7_7500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:dell_g7_7700_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "dell_g7_7700_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.30.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:vostro_13_5310_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_13_5310_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3630_tower_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "precision_3630_tower_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "2.25.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:vostro_5320_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3530_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_13_5320_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_13_5320_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.16.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:inspiron_13_5330_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_13_5330_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.12.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:vostro_15_5510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_14_5410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_15_5510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_15_5518_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_14_5418_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_14_5410_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_14_5410_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "2.24.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:vostro_14_3430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_15_3530_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5480_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_9440_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_27_7720_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_24_5420_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_15_3530_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_15_3530_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.8.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:inspiron_27_7710_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_24_5410_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_24_5411_all-in-one_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_24_5411_all-in-one_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.18.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_13_7390_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7740_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7540_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7424_rugged_extreme_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5420_rugged_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5424_rugged_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5300_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3301_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5593_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3793_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3593_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_3593_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:inspiron_3881_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3880_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_3880_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.24.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:vostro_5890_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3890_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:vostro_3690_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_3891_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_3891_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.22.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:vostro_5301_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7730_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_7530_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5290_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3190_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3190_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_7300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:inspiron_5301_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "inspiron_5301_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.31.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_15_7590_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:xps_15_9510_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5560_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5540_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3551_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_7090_ultra_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3090_ultra_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_9410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7400_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5511_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5411_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3300_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_3300_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.25.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_15_9530_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_5680_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3540_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3440_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3340_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_3340_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.10.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:precision_5530_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_3420_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_3420_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.34.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_5590_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5290_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_5290_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.32.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:precision_3560_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5320_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_5320_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.36.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:precision_3580_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3581_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5540_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5340_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_5340_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.10.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_5420_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_5420_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.36.2",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:precision_3570_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_5530_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_5530_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.21.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_rugged_7220_extreme_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7220_rugged_extreme_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_7220_rugged_extreme_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.33.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_7490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7390_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7290_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_7290_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.35.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_7520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7420_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:latitude_7320_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_7320_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.34.2",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:latitude_9520_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "latitude_9520_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.30.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:optiplex_3000_thin_client_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "optiplex_3000_thin_client_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.15.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_13_9310_2-in-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3080_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "optiplex_3080_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "2.22.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:xps_8940_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_3090_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "optiplex_3090_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "2.16.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:optiplex_7090_tower_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5090_micro_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5090_small_form_factor_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5090_tower_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "optiplex_5090_tower_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.22.2",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:optiplex_7400_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5400_all-in-one_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "optiplex_5400_all-in-one_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.1.37",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:optiplex_7490_all-in-one_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:optiplex_5490_all-in-one_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "optiplex_5490_all-in-one_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.27.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:precision_3460_small_form_factor_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3460_xe_small_form_factor_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3260_compact_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:precision_3260_xe_compact_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "precision_3260_xe_compact_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "3.3.2",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:precision_3650_tower_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "precision_3650_tower_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "1.28.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:dell:precision_3660_firmware:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "precision_3660_firmware",
"vendor": "dell",
"versions": [
{
"lessThan": "2.11.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-43078",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-28T14:17:19.963412Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-08-28T22:31:00.645Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Dell Client Platform, Dell Dock Firmware",
"vendor": "Dell",
"versions": [
{
"lessThan": "1.27.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.22.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.14.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.11.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.19.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.20.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.24.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.26.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.12.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.28.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.17.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.23.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.30.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.25.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.16.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.12.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.24.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.8.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.18.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.29.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.24.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.22.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.25.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.10.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.34.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.32.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.36.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.10.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.36.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.21.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.33.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.35.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.34.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.30.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.15.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.22.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.16.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.22.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.1.37",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.27.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "3.3.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.28.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.11.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.28.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.28.8",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.1.16",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.20.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.9.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.6.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.1.15",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.23.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "3.20.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.19.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.9.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.13.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.0.14.20",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "01.00.15",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "01.00.36",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.62.156.006",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.66.128.015",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.65.111.022",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.61.124.014",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.46.147.004",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.46.134.013",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.66.131.016",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.46.135.009",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.65.162.003",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.65.119.017",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.62.140.014",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.46.166.001",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.65.163.002",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.62.139.013",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.46.112.015",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.65.116.019",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.46.143.009",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.46.145.004",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.65.117.031",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.62.102.024",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.65.108.018",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.69.120.013",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "4.46.106.031",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "7.2.2.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "74.64",
"status": "affected",
"version": "N/A",
"versionType": "semver"
}
]
}
],
"datePublic": "2024-02-22T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dell Dock Firmware and Dell Client Platform contain an Improper Link Resolution vulnerability during installation resulting in arbitrary folder deletion, which could lead to Privilege Escalation or Denial of Service."
}
],
"value": "Dell Dock Firmware and Dell Client Platform contain an Improper Link Resolution vulnerability during installation resulting in arbitrary folder deletion, which could lead to Privilege Escalation or Denial of Service."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-59",
"description": "CWE-59: Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-28T05:33:16.899Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000217981/dsa-2023-362-security-update-for-dell-dock-firmware-and-dell-client-platform-for-an-improper-link-resolution-vulnerability"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-43078",
"datePublished": "2024-08-28T05:33:16.899Z",
"dateReserved": "2023-09-15T07:02:11.648Z",
"dateUpdated": "2024-08-28T22:31:00.645Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-0158 (GCVE-0-2024-0158)
Vulnerability from cvelistv5 – Published: 2024-07-02 06:20 – Updated: 2024-08-01 17:41
VLAI?
Summary
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with admin privileges may potentially exploit this vulnerability to modify a UEFI variable, leading to denial of service and escalation of privileges
Severity ?
5.1 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dell | CPG BIOS |
Affected:
N/A , < 1.28.0
(semver)
Affected: N/A , < 1.23.0 (semver) Affected: N/A , < 1.15.0 (semver) Affected: N/A , < 1.2.1 (semver) Affected: N/A , < 1.12.1 (semver) Affected: N/A , < 1.2.0 (semver) Affected: N/A , < 1.20.0 (semver) Affected: N/A , < 1.12.0 (semver) Affected: N/A , < 1.26.0 (semver) Affected: N/A , < 1.27.0 (semver) Affected: N/A , < 1.13.0 (semver) Affected: N/A , < 1.29.0 (semver) Affected: N/A , < 1.19.0 (semver) Affected: N/A , < 1.25.0 (semver) Affected: N/A , < 1.31.0 (semver) Affected: N/A , < 2.27.0 (semver) Affected: N/A , < 2.35.0 (semver) Affected: N/A , < 2.39.0 (semver) Affected: N/A , < 1.17.0 (semver) Affected: N/A , < 1.24.0 (semver) Affected: N/A , < 2.26.0 (semver) Affected: N/A , < 1.13.1 (semver) Affected: N/A , < 2.25.0 (semver) Affected: N/A , < 1.3.1 (semver) Affected: N/A , < 1.18.0 (semver) Affected: N/A , < 1.21.0 (semver) Affected: N/A , < 1.22.0 (semver) Affected: N/A , < 1.9.0 (semver) Affected: N/A , < 1.3.0 (semver) Affected: N/A , < 1.30.0 (semver) Affected: N/A , < 1.32.0 (semver) Affected: N/A , < 1.29..0 (semver) Affected: N/A , < 1.45.0 (semver) Affected: N/A , < 1.33.0 (semver) Affected: N/A , < 1.11.0 (semver) Affected: N/A , < 1.35.0 (semver) Affected: N/A , < 1.34.0 (semver) Affected: N/A , < 1.36.0 (semver) Affected: N/A , < 1.36.2 (semver) Affected: N/A , < 1.25.1 (semver) Affected: N/A , < 1.21.1 (semver) Affected: N/A , < 1.4.1 (semver) Affected: N/A , < 1.49.0 (semver) Affected: N/A , < 1.37.0 (semver) Affected: N/A , < 1.34.2 (semver) Affected: N/A , < 1.30.1 (semver) Affected: N/A , < 1.16.1 (semver) Affected: N/A , < 2.24.0 (semver) Affected: N/A , < 2.18.0 (semver) Affected: N/A , < 1.1.38 (semver) Affected: N/A , < 3.3.2 (semver) Affected: N/A , < 2.29.0 (semver) Affected: N/A , < 2.12.0 (semver) Affected: N/A , < 2.30.0 (semver) Affected: N/A , < 1.30.8 (semver) Affected: N/A , < 1.10.0 (semver) Affected: N/A , < 1.26.1 (semver) Affected: N/A , < 1.1.17 (semver) Affected: N/A , < 1.20.1 (semver) Affected: N/A , < 1.7.0 (semver) Affected: N/A , < 01.03.00 (semver) Affected: N/A , < 1.1.16 (semver) Affected: N/A , < 3.21.0 (semver) Affected: N/A , < 2.23.0 (semver) Affected: N/A , < 1.19.1 (semver) Affected: N/A , < 2.10.0 (semver) Affected: N/A , < 2.18.1 (semver) Affected: N/A , < 1.14.0 (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-0158",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-07-02T14:21:02.955425Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-07-02T14:21:13.009Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T17:41:16.039Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-in/000220141/dsa-2024-030-security-update-for-dell-client-bios-for-an-improper-input-validation-vulnerability"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"lessThan": "1.28.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.23.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.15.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.2.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.12.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.2.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.20.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.12.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.26.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.27.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.13.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.29.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.19.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.25.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.27.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.35.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.39.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.17.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.24.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.26.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.13.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.25.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.3.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.18.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.21.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.22.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.9.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.3.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.30.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.32.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.29..0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.45.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.33.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.11.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.35.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.34.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.36.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.36.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.25.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.21.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.4.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.49.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.37.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.34.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.30.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.16.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.24.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.18.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.1.38",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "3.3.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.29.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.12.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.30.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.30.8",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.10.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.26.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.1.17",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.20.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.7.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "01.03.00",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.1.16",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "3.21.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.23.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.19.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.10.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.18.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.14.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
}
]
}
],
"datePublic": "2024-03-12T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with admin privileges may potentially exploit this vulnerability to modify a UEFI variable, leading to denial of service and escalation of privileges"
}
],
"value": "Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with admin privileges may potentially exploit this vulnerability to modify a UEFI variable, leading to denial of service and escalation of privileges"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20: Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-07-02T06:20:44.735Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-in/000220141/dsa-2024-030-security-update-for-dell-client-bios-for-an-improper-input-validation-vulnerability"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2024-0158",
"datePublished": "2024-07-02T06:20:44.735Z",
"dateReserved": "2023-12-14T05:30:35.591Z",
"dateUpdated": "2024-08-01T17:41:16.039Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-22448 (GCVE-0-2024-22448)
Vulnerability from cvelistv5 – Published: 2024-04-10 07:30 – Updated: 2024-08-01 22:43
VLAI?
Summary
Dell BIOS contains an Out-of-Bounds Write vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to denial of service.
Severity ?
4.7 (Medium)
CWE
- CWE-787 - Out-of-bounds Write
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dell | CPG BIOS |
Affected:
N/A , < 1.29.0
(semver)
Affected: N/A , < 1.16.0 (semver) Affected: N/A , < 1.13.0 (semver) Affected: N/A , < 1.28.0 (semver) Affected: N/A , < 1.14.0 (semver) Affected: N/A , < 1.31.0 (semver) Affected: N/A , < 1.31.1 (semver) Affected: N/A , < 1.31.2 (semver) Affected: N/A , < 1.31.3 (semver) Affected: N/A , < 1.31.4 (semver) Affected: N/A , < 1.31.5 (semver) Affected: N/A , < 1.31.6 (semver) Affected: N/A , < 1.31.7 (semver) Affected: N/A , < 1.31.8 (semver) Affected: N/A , < 1.31.9 (semver) Affected: N/A , < 1.31.10 (semver) Affected: N/A , < 1.31.11 (semver) Affected: N/A , < 1.31.12 (semver) Affected: N/A , < 1.31.13 (semver) Affected: N/A , < 1.31.14 (semver) Affected: N/A , < 1.31.15 (semver) Affected: N/A , < 1.31.16 (semver) |
Credits
Dell Technologies would like to thank Eason for reporting this issue.
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:dell:alienware_16_r1:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "alienware_16_r1",
"vendor": "dell",
"versions": [
{
"lessThan": "1.13.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:dell:alienware_15_r6:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "alienware_15_r6",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:dell:alienware_18_r1:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "alienware_18_r1",
"vendor": "dell",
"versions": [
{
"lessThan": "1.16.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:dell:alienware_14_r2:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "alienware_14_r2",
"vendor": "dell",
"versions": [
{
"lessThan": "1.13.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:g15_5511:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "g15_5511",
"vendor": "dell",
"versions": [
{
"lessThan": "1.28.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:g15_5530:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "g15_5530",
"vendor": "dell",
"versions": [
{
"lessThan": "1.14.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:g16_7620:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "g16_7620",
"vendor": "dell",
"versions": [
{
"lessThan": "1.14.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:g3_3500:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "g3_3500",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:g5_5500:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "g5_5500",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:g7_7500:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "g7_7500",
"vendor": "dell",
"versions": [
{
"lessThan": "1.31.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:g7_7700:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "g7_7700",
"vendor": "dell",
"versions": [
{
"lessThan": "1.31.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:inspiron_13_5330:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "inspiron_13_5330",
"vendor": "dell",
"versions": [
{
"lessThan": "1.14.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:dell:inspiron_15_3530:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "inspiron_15_3530",
"vendor": "dell",
"versions": [
{
"lessThan": "1.10.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:dell:inspiron_3030s:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "inspiron_3030s",
"vendor": "dell",
"versions": [
{
"lessThan": "1.3.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:inspiron_5301:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "inspiron_5301",
"vendor": "dell",
"versions": [
{
"lessThan": "1.32.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:inspiron_5400:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "inspiron_5400",
"vendor": "dell",
"versions": [
{
"lessThan": "1.27.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:inspiron_5401:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "inspiron_5401",
"vendor": "dell",
"versions": [
{
"lessThan": "1.27.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:inspiron_5402:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "inspiron_5402",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:inspiron_5409:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "inspiron_5409",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:inspiron_5502:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "inspiron_5502",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:inspiron_5509:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "inspiron_5509",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:inspiron_7300:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "inspiron_7300",
"vendor": "dell",
"versions": [
{
"lessThan": "1.32.0",
"status": "affected",
"version": "-",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:inspiron_7400:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "inspiron_7400",
"vendor": "dell",
"versions": [
{
"lessThan": "1.32.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:inspiron_7700_aio:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "inspiron_7700_aio",
"vendor": "dell",
"versions": [
{
"lessThan": "1.27.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:latitude_5310:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_5310",
"vendor": "dell",
"versions": [
{
"lessThan": "1.23.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:latitude_5310_2_in_1:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_5310_2_in_1",
"vendor": "dell",
"versions": [
{
"lessThan": "1.23.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:latitude_5330:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_5330",
"vendor": "dell",
"versions": [
{
"lessThan": "1.321.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:dell:latitude_5340:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_5340",
"vendor": "dell",
"versions": [
{
"lessThan": "1.12.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:latitude_5531:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_5531",
"vendor": "dell",
"versions": [
{
"lessThan": "1.22.0",
"status": "affected",
"version": "-",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:dell:latitude_5540:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_5540",
"vendor": "dell",
"versions": [
{
"lessThan": "1.12.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:latitude_7320:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_7320",
"vendor": "dell",
"versions": [
{
"lessThan": "1.34.0",
"status": "affected",
"version": "-",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:dell:latitude_7340:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_7340",
"vendor": "dell",
"versions": [
{
"lessThan": "1.13.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:latitude_7420:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_7420",
"vendor": "dell",
"versions": [
{
"lessThan": "1.34.0",
"status": "affected",
"version": "-",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:latitude_7520:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_7520",
"vendor": "dell",
"versions": [
{
"lessThan": "1.34.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:latitude_9330:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_9330",
"vendor": "dell",
"versions": [
{
"lessThan": "1.19.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:latitude_9420:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_9420",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:latitude_9430:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_9430",
"vendor": "dell",
"versions": [
{
"lessThan": "1.22.0",
"status": "affected",
"version": "-",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:dell:latitude_9440_2in1:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "latitude_9440_2in1",
"vendor": "dell",
"versions": [
{
"lessThan": "1.10.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:optiplex_micro_7010:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "optiplex_micro_7010",
"vendor": "dell",
"versions": [
{
"lessThan": "1.13.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:optiplex_small_form_factor_7010:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "optiplex_small_form_factor_7010",
"vendor": "dell",
"versions": [
{
"lessThan": "1.13.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:optiplex_tower_7010:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "optiplex_tower_7010",
"vendor": "dell",
"versions": [
{
"lessThan": "1.13.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:precision_3440:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "precision_3440",
"vendor": "dell",
"versions": [
{
"lessThan": "1.25.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:precision_3571:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "precision_3571",
"vendor": "dell",
"versions": [
{
"lessThan": "1.22.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:dell:precision_3580:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "precision_3580",
"vendor": "dell",
"versions": [
{
"lessThan": "1.12.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:precision_3581:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "precision_3581",
"vendor": "dell",
"versions": [
{
"lessThan": "1.12.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:precision_3660:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "precision_3660",
"vendor": "dell",
"versions": [
{
"lessThan": "2.13.0",
"status": "affected",
"version": "-",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:precision_5570:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "precision_5570",
"vendor": "dell",
"versions": [
{
"lessThan": "1.22.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:precision_5750:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "precision_5750",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:precision_5770:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "precision_5770",
"vendor": "dell",
"versions": [
{
"lessThan": "1.24.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:vostro_14_3430:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "vostro_14_3430",
"vendor": "dell",
"versions": [
{
"lessThan": "1.10.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:vostro_15_3530:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "vostro_15_3530",
"vendor": "dell",
"versions": [
{
"lessThan": "1.10.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:vostro_3030s:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "vostro_3030s",
"vendor": "dell",
"versions": [
{
"lessThan": "1.3.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:vostro_5301:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "vostro_5301",
"vendor": "dell",
"versions": [
{
"lessThan": "1.32.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:vostro_5402:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "vostro_5402",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:vostro_5502:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "vostro_5502",
"vendor": "dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "-",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:vostro_5880:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "vostro_5880",
"vendor": "dell",
"versions": [
{
"lessThan": "1.25.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:xps_17_9700:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "xps_17_9700",
"vendor": "dell",
"versions": [
{
"lessThan": "1.24.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:xps_17_9730:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "xps_17_9730",
"vendor": "dell",
"versions": [
{
"lessThan": "1.11.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:h:dell:xps_9315_2in1:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "xps_9315_2in1",
"vendor": "dell",
"versions": [
{
"lessThan": "1.15.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-22448",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-04-22T16:57:10.462584Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T17:52:58.050Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T22:43:34.907Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000221744/dsa-2024-066"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"lessThan": "1.29.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.16.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.13.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.28.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.14.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.3",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.4",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.5",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.6",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.7",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.8",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.9",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.10",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.11",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.12",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.13",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.14",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.15",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.16",
"status": "affected",
"version": "N/A",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Dell Technologies would like to thank Eason for reporting this issue."
}
],
"datePublic": "2024-04-09T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dell BIOS contains an Out-of-Bounds Write vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to denial of service."
}
],
"value": "Dell BIOS contains an Out-of-Bounds Write vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to denial of service."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-787",
"description": "CWE-787: Out-of-bounds Write",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-04-10T07:30:08.507Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000221744/dsa-2024-066"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2024-22448",
"datePublished": "2024-04-10T07:30:08.507Z",
"dateReserved": "2024-01-10T15:26:10.250Z",
"dateUpdated": "2024-08-01T22:43:34.907Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-28063 (GCVE-0-2023-28063)
Vulnerability from cvelistv5 – Published: 2024-02-06 07:38 – Updated: 2024-08-02 12:30
VLAI?
Summary
Dell BIOS contains a Signed to Unsigned Conversion Error vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to denial of service.
Severity ?
6.7 (Medium)
CWE
- CWE-195 - Signed to Unsigned Conversion Error
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dell | CPG BIOS |
Affected:
1.24.0
Affected: 1.17.0 Affected: 1.13.0 Affected: 1.5.1 Affected: 1.21.0 Affected: 1.20.0 Affected: 1.23.0 Affected: 1.26.0 Affected: 1.25.0 Affected: 1.15.0 Affected: 1.12.0 Affected: 2.20.0 Affected: 1.14.0 Affected: 1.27.0 Affected: 1.19.0 Affected: 1.22.1 Affected: 2.21.0 Affected: 1.18.0 Affected: 1.7.0 Affected: 1.28.0 Affected: 1.22.0 Affected: 1.29.0 Affected: 1.30.0 Affected: 1.11.0 Affected: 1.13.1 Affected: 1.26.1 Affected: 1.13.2 Affected: 1.14.1 Affected: 1.33.0 Affected: 1.31.0 Affected: 1.12.1 Affected: 1.18.1 Affected: 1.10.0 Affected: 2.14.0 Affected: 1.1.28 Affected: 1.4.1 Affected: 2.5.1 Affected: 2.4.0 Affected: 2.6.1 Affected: 1.26.8 Affected: 1.24.1 Affected: 1.17.1 Affected: 1.29.1 Affected: 1.1.0 Affected: 1.16.0 Affected: 3.17.0 Affected: 2.19.0 Affected: 1.8.1 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-28063",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-02-06T17:07:13.502616Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-07-05T17:21:34.998Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T12:30:23.947Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000214780/dsa-2023-176-dell-client-bios-security-update-for-a-signed-to-unsigned-conversion-error-vulnerability"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "1.24.0"
},
{
"status": "affected",
"version": "1.17.0"
},
{
"status": "affected",
"version": "1.13.0"
},
{
"status": "affected",
"version": "1.5.1"
},
{
"status": "affected",
"version": "1.21.0"
},
{
"status": "affected",
"version": "1.20.0"
},
{
"status": "affected",
"version": "1.23.0"
},
{
"status": "affected",
"version": "1.26.0"
},
{
"status": "affected",
"version": "1.25.0"
},
{
"status": "affected",
"version": "1.15.0"
},
{
"status": "affected",
"version": "1.12.0"
},
{
"status": "affected",
"version": "2.20.0"
},
{
"status": "affected",
"version": "1.14.0"
},
{
"status": "affected",
"version": "1.27.0"
},
{
"status": "affected",
"version": "1.19.0"
},
{
"status": "affected",
"version": "1.22.1"
},
{
"status": "affected",
"version": "2.21.0"
},
{
"status": "affected",
"version": "1.18.0"
},
{
"status": "affected",
"version": "1.7.0"
},
{
"status": "affected",
"version": "1.28.0"
},
{
"status": "affected",
"version": "1.22.0"
},
{
"status": "affected",
"version": "1.29.0"
},
{
"status": "affected",
"version": "1.30.0"
},
{
"status": "affected",
"version": "1.11.0"
},
{
"status": "affected",
"version": "1.13.1"
},
{
"status": "affected",
"version": "1.26.1"
},
{
"status": "affected",
"version": "1.13.2"
},
{
"status": "affected",
"version": "1.14.1"
},
{
"status": "affected",
"version": "1.33.0"
},
{
"status": "affected",
"version": "1.31.0"
},
{
"status": "affected",
"version": "1.12.1"
},
{
"status": "affected",
"version": "1.18.1"
},
{
"status": "affected",
"version": "1.10.0"
},
{
"status": "affected",
"version": "2.14.0"
},
{
"status": "affected",
"version": "1.1.28"
},
{
"status": "affected",
"version": "1.4.1"
},
{
"status": "affected",
"version": "2.5.1"
},
{
"status": "affected",
"version": "2.4.0"
},
{
"status": "affected",
"version": "2.6.1"
},
{
"status": "affected",
"version": "1.26.8"
},
{
"status": "affected",
"version": "1.24.1"
},
{
"status": "affected",
"version": "1.17.1"
},
{
"status": "affected",
"version": "1.29.1"
},
{
"status": "affected",
"version": "1.1.0"
},
{
"status": "affected",
"version": "1.16.0"
},
{
"status": "affected",
"version": "3.17.0"
},
{
"status": "affected",
"version": "2.19.0"
},
{
"status": "affected",
"version": "1.8.1"
}
]
}
],
"datePublic": "2023-06-13T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell BIOS contains a Signed to Unsigned Conversion Error vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to denial of service.\u003c/span\u003e\n\n"
}
],
"value": "\nDell BIOS contains a Signed to Unsigned Conversion Error vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to denial of service.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-195",
"description": "CWE-195: Signed to Unsigned Conversion Error",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-02-06T07:38:54.321Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000214780/dsa-2023-176-dell-client-bios-security-update-for-a-signed-to-unsigned-conversion-error-vulnerability"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-28063",
"datePublished": "2024-02-06T07:38:54.321Z",
"dateReserved": "2023-03-10T05:06:06.441Z",
"dateUpdated": "2024-08-02T12:30:23.947Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-43088 (GCVE-0-2023-43088)
Vulnerability from cvelistv5 – Published: 2023-12-22 18:00 – Updated: 2024-08-02 19:37
VLAI?
Summary
Dell Client BIOS contains a pre-boot direct memory access (DMA) vulnerability. An authenticated attacker with physical access to the system may potentially exploit this vulnerability in order to execute arbitrary code on the device.
Severity ?
7.2 (High)
CWE
- CWE-16 - Configuration
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T19:37:23.719Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000218223/dsa-2023-377"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"Precision 7865 Tower"
],
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "Versions prior to 1.5.0"
}
]
}
],
"datePublic": "2023-12-19T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell Client BIOS contains a pre-boot direct memory access (DMA) vulnerability. An authenticated attacker with physical access to the system may potentially exploit this vulnerability in order to execute arbitrary code on the device.\u003c/span\u003e\n\n"
}
],
"value": "\nDell Client BIOS contains a pre-boot direct memory access (DMA) vulnerability. An authenticated attacker with physical access to the system may potentially exploit this vulnerability in order to execute arbitrary code on the device.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-16",
"description": "CWE-16: Configuration",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-12-22T18:00:38.953Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000218223/dsa-2023-377"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-43088",
"datePublished": "2023-12-22T18:00:38.953Z",
"dateReserved": "2023-09-15T07:03:52.367Z",
"dateUpdated": "2024-08-02T19:37:23.719Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-28058 (GCVE-0-2023-28058)
Vulnerability from cvelistv5 – Published: 2023-06-23 10:30 – Updated: 2024-11-07 21:07
VLAI?
Summary
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
Severity ?
5.1 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T12:30:23.586Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-28058",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-07T21:06:57.836824Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-07T21:07:06.911Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "All Versions"
}
]
}
],
"datePublic": "2023-06-14T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\u003c/span\u003e\n\n"
}
],
"value": "\nDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20: Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-06-23T10:30:27.581Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-28058",
"datePublished": "2023-06-23T10:30:27.581Z",
"dateReserved": "2023-03-10T05:01:55.232Z",
"dateUpdated": "2024-11-07T21:07:06.911Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-28050 (GCVE-0-2023-28050)
Vulnerability from cvelistv5 – Published: 2023-06-23 10:25 – Updated: 2024-11-07 21:09
VLAI?
Summary
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
Severity ?
5.1 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T12:30:22.772Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-28050",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-07T21:07:21.607702Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-07T21:09:09.993Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "All Versions"
}
]
}
],
"datePublic": "2023-06-14T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\u003c/span\u003e\n\n"
}
],
"value": "\nDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20: Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-06-23T10:25:56.877Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-28050",
"datePublished": "2023-06-23T10:25:56.877Z",
"dateReserved": "2023-03-10T05:01:43.871Z",
"dateUpdated": "2024-11-07T21:09:09.993Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-28026 (GCVE-0-2023-28026)
Vulnerability from cvelistv5 – Published: 2023-06-23 10:23 – Updated: 2024-12-04 14:43
VLAI?
Summary
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
Severity ?
5.1 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T12:23:30.812Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-28026",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-12-04T14:43:48.808973Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-12-04T14:43:58.513Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "All Versions"
}
]
}
],
"datePublic": "2023-06-14T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\u003c/span\u003e\n\n"
}
],
"value": "\nDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20: Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-06-23T10:23:05.908Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-28026",
"datePublished": "2023-06-23T10:23:05.908Z",
"dateReserved": "2023-03-10T04:57:40.870Z",
"dateUpdated": "2024-12-04T14:43:58.513Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-28044 (GCVE-0-2023-28044)
Vulnerability from cvelistv5 – Published: 2023-06-23 10:20 – Updated: 2024-11-07 21:09
VLAI?
Summary
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
Severity ?
5.1 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T12:30:22.690Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-28044",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-07T21:09:18.405245Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-07T21:09:31.489Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "All Versions"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\u003c/span\u003e\n\n"
}
],
"value": "\nDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20: Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-06-23T10:20:01.132Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-28044",
"datePublished": "2023-06-23T10:20:01.132Z",
"dateReserved": "2023-03-10T04:59:39.426Z",
"dateUpdated": "2024-11-07T21:09:31.489Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-28060 (GCVE-0-2023-28060)
Vulnerability from cvelistv5 – Published: 2023-06-23 10:17 – Updated: 2024-11-07 21:26
VLAI?
Summary
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
Severity ?
5.1 (Medium)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T12:30:22.781Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-28060",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-07T21:26:23.822877Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-07T21:26:38.861Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "All Versions"
}
]
}
],
"datePublic": "2023-06-14T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\u003c/span\u003e\n\n"
}
],
"value": "\nDell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20: Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-06-23T10:17:46.249Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2023-28060",
"datePublished": "2023-06-23T10:17:46.249Z",
"dateReserved": "2023-03-10T05:01:55.232Z",
"dateUpdated": "2024-11-07T21:26:38.861Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}