CVE-2022-31226 (GCVE-0-2022-31226)
Vulnerability from cvelistv5 – Published: 2022-09-12 18:35 – Updated: 2024-09-16 23:05
VLAI?
Summary
Dell BIOS versions contain a Stack-based Buffer Overflow vulnerability. A local authenticated malicious user could potentially exploit this vulnerability by sending excess data to a function in order to gain arbitrary code execution on the system.
Severity ?
7.1 (High)
CWE
- CWE-121 - Stack-based Buffer Overflow
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T07:11:39.865Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.dell.com/support/kbdoc/000202196"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "CPG BIOS",
"vendor": "Dell",
"versions": [
{
"lessThan": "21Q4 platforms",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"datePublic": "2022-08-05T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Dell BIOS versions contain a Stack-based Buffer Overflow vulnerability. A local authenticated malicious user could potentially exploit this vulnerability by sending excess data to a function in order to gain arbitrary code execution on the system."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "CWE-121: Stack-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-09-12T18:35:22",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.dell.com/support/kbdoc/000202196"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@dell.com",
"DATE_PUBLIC": "2022-08-05",
"ID": "CVE-2022-31226",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "CPG BIOS",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "21Q4 platforms"
}
]
}
}
]
},
"vendor_name": "Dell"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Dell BIOS versions contain a Stack-based Buffer Overflow vulnerability. A local authenticated malicious user could potentially exploit this vulnerability by sending excess data to a function in order to gain arbitrary code execution on the system."
}
]
},
"impact": {
"cvss": {
"baseScore": 7.1,
"baseSeverity": "High",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-121: Stack-based Buffer Overflow"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.dell.com/support/kbdoc/000202196",
"refsource": "MISC",
"url": "https://www.dell.com/support/kbdoc/000202196"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2022-31226",
"datePublished": "2022-09-12T18:35:22.684202Z",
"dateReserved": "2022-05-19T00:00:00",
"dateUpdated": "2024-09-16T23:05:44.241Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2022-31226\",\"sourceIdentifier\":\"security_alert@emc.com\",\"published\":\"2022-09-12T19:15:09.390\",\"lastModified\":\"2024-11-21T07:04:10.827\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Dell BIOS versions contain a Stack-based Buffer Overflow vulnerability. A local authenticated malicious user could potentially exploit this vulnerability by sending excess data to a function in order to gain arbitrary code execution on the system.\"},{\"lang\":\"es\",\"value\":\"Las versiones de Dell BIOS contienen una vulnerabilidad de Desbordamiento del B\u00fafer en la Regi\u00f3n Stack de la Memoria. Un usuario malicioso autenticado localmente podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de un exceso de datos a una funci\u00f3n para conseguir una ejecuci\u00f3n de c\u00f3digo arbitrario en el sistema\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security_alert@emc.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H\",\"baseScore\":7.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.2},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"security_alert@emc.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-121\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dell:chengming_3900_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.1.66\",\"matchCriteriaId\":\"4ABA1EB9-E120-4022-859D-BEA3D8D3C322\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:chengming_3900:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15E2ECE6-1E6F-4E84-B3CB-067B4E065268\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dell:inspiron_14_plus_7420_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.2.0\",\"matchCriteriaId\":\"111298D7-EE80-48B4-9C27-1C24483A98E2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:inspiron_14_plus_7420:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE239B9D-0D57-4DF7-B63D-7B6D60038609\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dell:inspiron_16_plus_7620_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.2.0\",\"matchCriteriaId\":\"F6F88F1A-AC8F-4178-B00E-29934DC31315\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:inspiron_16_plus_7620:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7830B4B7-1153-4DFB-935E-DF4B5A562E74\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dell:inspiron_3910_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.1.66\",\"matchCriteriaId\":\"7B87F4A3-C187-4840-86AD-6B7C9CD8C61E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:inspiron_3910:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A45EDB0-1897-4C15-807F-CE9AE0B0ACD0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dell:inspiron_5320_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.1.0\",\"matchCriteriaId\":\"1D9520A2-CF13-4FB9-B971-ACD9CADF644E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:inspiron_5320:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9D1E517-D85A-42BA-A224-DE5E0C7B2912\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dell:inspiron_5420_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.4.1\",\"matchCriteriaId\":\"FD4FF789-86F1-46DC-A1AC-87053BDBD7E5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:inspiron_5420:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C769A612-8800-4A42-B28F-21C9C47041B0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dell:inspiron_5620_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.4.1\",\"matchCriteriaId\":\"C672F4A8-2ABF-4092-9773-3BDC402BE23F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:inspiron_5620:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5273F5B-9A70-4E33-A7E1-94F89BC65531\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dell:inspiron_7420_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.3.0\",\"matchCriteriaId\":\"9B6DA5C9-AFC7-48F3-A9FE-6333CBCC5A4A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:inspiron_7420:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C1ACD6F-C805-4FF7-9766-0319C273455F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dell:inspiron_7620_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.3.0\",\"matchCriteriaId\":\"42665B76-BAE3-40C5-B4E3-879CCC1D246D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:inspiron_7620:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0452378A-736C-4BD0-A581-88FC5E1EF08F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dell:optiplex_3000_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.1.66\",\"matchCriteriaId\":\"A8C073B6-CB0D-4C55-8663-FFF9B651E463\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:optiplex_3000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF4DFD8E-6091-46BE-AFB1-3AAADC4480CF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dell:optiplex_3000_thin_client_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.7\",\"matchCriteriaId\":\"DB0FD980-4776-4475-9394-F68FE61723AF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:optiplex_3000_thin_client:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C4B0B6B-7740-46D0-9FE0-3AFF8D9B4DDA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dell:optiplex_5000_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.3.62\",\"matchCriteriaId\":\"7C030747-BAC5-4E6B-B44C-A2A2F71805FC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:optiplex_5000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77A30EA6-C9E4-40AD-AE92-0AB3891BC001\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dell:optiplex_5400_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.13\",\"matchCriteriaId\":\"86ED87FB-3696-4185-AAE8-759549C2793D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:optiplex_5400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F53D91BF-DA1C-4BFB-9E17-AB5266DB255F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dell:optiplex_7000_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.3.62\",\"matchCriteriaId\":\"9E2C7116-C25E-4D1D-B1FC-798A46014438\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:optiplex_7000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3B517F7-D2D1-44DD-B917-1CE71F30C13B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dell:optiplex_7000_oem_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.3.62\",\"matchCriteriaId\":\"1A649171-2633-4FF4-8C6D-B19CBD6779AC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:optiplex_7000_oem:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B33F8E75-DAB2-4303-8A0B-305077B492F2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dell:optiplex_7400_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.13\",\"matchCriteriaId\":\"17EBD3A6-3C58-43EA-90C6-0CA249C25D49\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:optiplex_7400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96921992-08BC-4D00-A248-191FC7CD09DD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dell:precision_3460_small_form_factor_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.3.62\",\"matchCriteriaId\":\"C2256294-49CD-42ED-A877-DFA5C16390A7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:precision_3460_small_form_factor:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BF5222C-6E3A-40FA-9DA7-7415AEC46930\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dell:precision_3660_tower_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.3.71\",\"matchCriteriaId\":\"8F680F8A-D48C-4B2F-AB77-808A95AB9721\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:precision_3660_tower:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"478B6D3B-CBB5-4CAD-971E-D613375E928D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dell:precision_5770_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.6.0\",\"matchCriteriaId\":\"C740009F-BE38-4BEC-9EC3-169CB724914F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:precision_5770:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FB330E8-BD8A-49B7-80DB-69C0FF8B0FEF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dell:vostro_3710_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.1.66\",\"matchCriteriaId\":\"53D9EF5C-5EDD-4239-90C6-A3E1649E64CF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:vostro_3710:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5DB3716-CB23-472A-B125-133B6D20AEB5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dell:vostro_3910_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.1.66\",\"matchCriteriaId\":\"F6FCBF9E-D794-44A8-A8A0-DF771DA3CFE4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:vostro_3910:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3897CDF5-2199-4721-95A9-105CBB2E50E1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dell:vostro_5320_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.1.0\",\"matchCriteriaId\":\"B10FB6B0-7B68-4FA6-AAED-555C4B73A767\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:vostro_5320:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03C7C578-C580-4D87-B097-078BDBC6C146\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dell:vostro_5620_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.4.1\",\"matchCriteriaId\":\"51AC9491-0504-476F-8B05-AFCCEBC39196\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:vostro_5620:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8876DEA0-1BC6-43FA-9124-F0E307961E03\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dell:vostro_7620_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.2.0\",\"matchCriteriaId\":\"2AA68A47-E67F-46F4-A11F-EFAD57854A3C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:vostro_7620:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01EAC888-0C54-41B8-8FB5-5E3DAE0F9FE9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dell:xps_17_9720_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.6.0\",\"matchCriteriaId\":\"71524B51-16E5-475C-AF85-11F992846E52\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:xps_17_9720:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFDED31E-C2D7-4075-B046-7AB2062247A6\"}]}]}],\"references\":[{\"url\":\"https://www.dell.com/support/kbdoc/000202196\",\"source\":\"security_alert@emc.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://www.dell.com/support/kbdoc/000202196\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…