Vulnerabilites related to Dell - Dell Client Platform BIOS
cve-2024-52541
Vulnerability from cvelistv5
Published
2025-02-19 16:46
Modified
2025-02-19 17:08
Severity ?
EPSS score ?
Summary
Dell Client Platform BIOS contains a Weak Authentication vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.
References
▼ | URL | Tags |
---|---|---|
https://www.dell.com/support/kbdoc/en-us/000258429/dsa-2025-021 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Dell | Dell Client Platform BIOS |
Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-52541", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-19T17:07:39.827843Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-19T17:08:48.094Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "Alienware m15 R6", "Alienware m15 R7", "Alienware m16 R1", "Alienware m16 R2", "Alienware M18 R2", "Alienware x14 R2", "Alienware X16 R2", "ChengMing 3900", "ChengMing 3910/3911", "ChengMing 3990", "Dell Edge Gateway 5000", "Dell G15 5510", "Dell G15 5511", "Dell G15 5530", "Dell G5 5000", "Dell Precision 3430 Tower", "Dell Precision 3431 Tower", "Dell Precision 3630 Tower", "Dell Precision 5820 Tower", "Dell Precision 7820 Tower", "Embedded Box PC 5000", "Inspiron 13 5320", "Inspiron 13 5330", "Inspiron 14\u00a0 5410/5418", "Inspiron 14 5420", "Inspiron 14 Plus 7420", "Inspiron 14 Plus 7440", "Inspiron 15 3530", "Inspiron 16 5640", "Inspiron 24 5420 All-in-One", "Inspiron 5301", "Inspiron 5400/5401", "Latitude 12 Rugged Extreme 7214", "Latitude 3190", "Latitude 3310", "Latitude 3310 2-In-1", "Latitude 3340", "Latitude 3400", "Latitude 3410", "Latitude 3420", "Latitude 5320", "Latitude 5400", "Latitude 5401", "Latitude 5420", "Latitude 5430 Rugged Laptop", "Latitude 5440", "Latitude 5480", "Latitude 7212 Rugged Extreme Tablet", "Latitude 7230 Rugged Extreme", "Latitude 7320", "Latitude 7350 Detachable", "Latitude 7450", "Latitude 9330", "Latitude 9420", "OptiPlex 3000 Thin Client", "OptiPlex 3070", "OptiPlex 3080", "OptiPlex 3090", "OptiPlex 5080", "OptiPlex 5400 All-In-One", "Precision 3260 XE Compact / Precision 3260 Compact", "Precision 3280 CFF", "Precision 3420 Tower", "Precision 3660", "Precision 3930 Rack", "Precision 5480", "Precision 5530 2-In-1", "Precision 5690", "Precision 5860 Tower", "Precision 7875 Tower", "Vostro 3681", "XPS 13 9310", "XPS 13 9310 2-in-1", "XPS 13 Plus 9320", "XPS 13 9340", "XPS 14 9440", "XPS 16 9640", "XPS 8940" ], "product": "Dell Client Platform BIOS", "vendor": "Dell", "versions": [ { "lessThan": "1.34.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.28.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.21.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.8.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.9.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.17.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.7.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.26.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.20.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.31.1", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.30.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.29.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.32.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.21.1", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.25.1", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.33.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.31.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "2.31.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "2.39.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "2.43.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.27.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.22.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.18.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "2.30.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.24.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.25.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.10.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.14.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.6.1", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.15.1", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.36.1", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.33.1", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.48.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.37.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.27.1", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.26.1", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.16.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.35.1", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.32.1", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.38.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.40.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.35.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.36.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.41.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.31.2", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.18.1", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.39.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.53.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.19.1", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.38.1", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.7.1", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.8.1", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.23.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.34.1", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.23.2", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.30.1", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "2.28.1", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "2.22.1", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.28.1", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.1.44", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "3.10.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.6.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "2.33.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "2.20.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "2.34.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.15.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.34.8", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.9.1", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "2.6.1", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "01.11.02", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "2.31.1", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "3.27.1", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "2.29.1", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "2.18.1", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.13.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.11.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.11.1", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "2.24.1", "status": "affected", "version": "N/A", "versionType": "semver" } ] } ], "datePublic": "2025-02-17T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Dell Client Platform BIOS contains a Weak Authentication vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.\u003cbr\u003e" } ], "value": "Dell Client Platform BIOS contains a Weak Authentication vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1390", "description": "CWE-1390: Weak Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-19T16:46:22.803Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000258429/dsa-2025-021" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2024-52541", "datePublished": "2025-02-19T16:46:22.803Z", "dateReserved": "2024-11-12T06:04:07.776Z", "dateUpdated": "2025-02-19T17:08:48.094Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-52537
Vulnerability from cvelistv5
Published
2024-12-11 07:26
Modified
2024-12-11 15:33
Severity ?
EPSS score ?
Summary
Dell Client Platform Firmware Update Utility contains an Improper Link Resolution vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.
References
▼ | URL | Tags |
---|---|---|
https://www.dell.com/support/kbdoc/en-us/000227591/dsa-2024-351 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Dell | Dell Client Platform BIOS |
Version: N/A ≤ Version: N/A ≤ |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-52537", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-11T15:32:58.624878Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-11T15:33:08.517Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Dell Client Platform BIOS", "vendor": "Dell", "versions": [ { "lessThan": "1.00.44, 1.00.28", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.00.23,1.00.28", "status": "affected", "version": "N/A", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Dell would like to thank Sandro Poppi for reporting this issue" } ], "datePublic": "2024-12-10T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Dell Client Platform Firmware Update Utility contains an Improper Link Resolution vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges." } ], "value": "Dell Client Platform Firmware Update Utility contains an Improper Link Resolution vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-61", "description": "CWE-61: UNIX Symbolic Link (Symlink) Following", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-11T07:26:36.371Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000227591/dsa-2024-351" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2024-52537", "datePublished": "2024-12-11T07:26:36.371Z", "dateReserved": "2024-11-12T06:04:07.775Z", "dateUpdated": "2024-12-11T15:33:08.517Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-38483
Vulnerability from cvelistv5
Published
2024-08-14 09:24
Modified
2024-08-15 14:24
Severity ?
EPSS score ?
Summary
Dell BIOS contains an Improper Input Validation vulnerability in an externally developed component. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Code execution.
References
▼ | URL | Tags |
---|---|---|
https://www.dell.com/support/kbdoc/en-us/000225776/dsa-2024-260 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Dell | Dell Client Platform BIOS |
Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:dell:latitude_5290_2-in-1_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "latitude_5290_2-in-1_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.35.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:precision_3420_tower_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "precision_3420_tower_firmware", "vendor": "dell", "versions": [ { "lessThan": "2.32.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:precision_3620_tower_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "precision_3620_tower_firmware", "vendor": "dell", "versions": [ { "lessThan": "2.32.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:wyse_7040_thin_client_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "wyse_7040_thin_client_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.26.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-38483", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-15T14:19:05.413802Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-15T14:24:22.170Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Dell Client Platform BIOS", "vendor": "Dell", "versions": [ { "lessThan": "1.35.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "2.32.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.26.0", "status": "affected", "version": "N/A", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "CVE-2024-38483: Dell Technologies would like to thank codebreaker1337 for reporting this issue." } ], "datePublic": "2024-08-13T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Dell BIOS contains an Improper Input Validation vulnerability in an externally developed component. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Code execution." } ], "value": "Dell BIOS contains an Improper Input Validation vulnerability in an externally developed component. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Code execution." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-14T09:24:10.775Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000225776/dsa-2024-260" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2024-38483", "datePublished": "2024-08-14T09:24:10.775Z", "dateReserved": "2024-06-18T01:53:34.136Z", "dateUpdated": "2024-08-15T14:24:22.170Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-47238
Vulnerability from cvelistv5
Published
2024-12-12 17:38
Modified
2024-12-12 19:00
Severity ?
EPSS score ?
Summary
Dell Client Platform BIOS contains an Improper Input Validation vulnerability in an externally developed component. A high privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary code execution.
References
▼ | URL | Tags |
---|---|---|
https://www.dell.com/support/kbdoc/en-us/000227595/dsa-2024-355 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Dell | Dell Client Platform BIOS |
Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-47238", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-12T19:00:41.886434Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-12T19:00:54.508Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Dell Client Platform BIOS", "vendor": "Dell", "versions": [ { "lessThan": "1.29.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.19.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.25.0", "status": "affected", "version": "N/A", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Dell Technologies would like to thank Eclypsium for reporting this issue." } ], "datePublic": "2024-12-11T18:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Dell Client Platform BIOS contains an Improper Input Validation vulnerability in an externally developed component. A high privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary code execution." } ], "value": "Dell Client Platform BIOS contains an Improper Input Validation vulnerability in an externally developed component. A high privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary code execution." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-12T17:38:19.407Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000227595/dsa-2024-355" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2024-47238", "datePublished": "2024-12-12T17:38:19.407Z", "dateReserved": "2024-09-23T05:36:07.682Z", "dateUpdated": "2024-12-12T19:00:54.508Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-39584
Vulnerability from cvelistv5
Published
2024-08-28 05:46
Modified
2024-08-28 14:15
Severity ?
EPSS score ?
Summary
Dell Client Platform BIOS contains a Use of Default Cryptographic Key Vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Secure Boot bypass and arbitrary code execution.
References
▼ | URL | Tags |
---|---|---|
https://www.dell.com/support/kbdoc/en-us/000227594/dsa-2024-354 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Dell | Dell Client Platform BIOS |
Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:dell:alienware_area_51m_r2_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_m15_r3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_m17_r3_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "alienware_m17_r3_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.29.0", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "cpes": [ "cpe:2.3:o:dell:alienware_aurora_r15_amd_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "alienware_aurora_r15_amd_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.15.0", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "cpes": [ "cpe:2.3:o:dell:alienware_x14_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "alienware_x14_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.21.0", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "cpes": [ "cpe:2.3:o:dell:alienware_x17_r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_x15_r1_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "alienware_x15_r1_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.24.0", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-39584", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-28T14:02:49.780082Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-28T14:15:01.978Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Dell Client Platform BIOS", "vendor": "Dell", "versions": [ { "lessThan": "1.29.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.15.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.21.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.24.0", "status": "affected", "version": "N/A", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "CVE-2024-39584: Dell Technologies would like to thank BINARLY REsearch team for reporting this issue." } ], "datePublic": "2024-08-27T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Dell Client Platform BIOS contains a Use of Default Cryptographic Key Vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Secure Boot bypass and arbitrary code execution." } ], "value": "Dell Client Platform BIOS contains a Use of Default Cryptographic Key Vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Secure Boot bypass and arbitrary code execution." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1392", "description": "CWE-1392: Use of Default Credentials", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-28T05:46:40.013Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000227594/dsa-2024-354" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2024-39584", "datePublished": "2024-08-28T05:46:40.013Z", "dateReserved": "2024-06-26T02:16:08.993Z", "dateUpdated": "2024-08-28T14:15:01.978Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }