All the vulnerabilites related to Dell - PowerEdge Platform
cve-2022-34414
Vulnerability from cvelistv5
Published
2023-03-16 11:37
Modified
2024-08-03 09:07
Severity ?
EPSS score ?
Summary
Dell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Dell | PowerEdge Platform |
Version: 14G,15G |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:07:16.263Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000206296/dsa-2022-204-dell-poweredge-improper-smm-communication-buffer-verification-vulnerability" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerEdge Platform", "vendor": "Dell", "versions": [ { "status": "affected", "version": "14G,15G" } ] } ], "datePublic": "2022-12-15T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.\u003c/span\u003e\n\n" } ], "value": "\nDell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-16T11:37:21.334Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000206296/dsa-2022-204-dell-poweredge-improper-smm-communication-buffer-verification-vulnerability" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2022-34414", "datePublished": "2023-03-16T11:37:21.334Z", "dateReserved": "2022-06-23T18:55:17.108Z", "dateUpdated": "2024-08-03T09:07:16.263Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34422
Vulnerability from cvelistv5
Published
2023-03-16 11:58
Modified
2024-08-03 09:07
Severity ?
EPSS score ?
Summary
Dell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Dell | PowerEdge Platform |
Version: 14G,15G |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:07:16.314Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000206296/dsa-2022-204-dell-poweredge-improper-smm-communication-buffer-verification-vulnerability" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerEdge Platform", "vendor": "Dell", "versions": [ { "status": "affected", "version": "14G,15G" } ] } ], "datePublic": "2022-12-15T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.\u003c/span\u003e\n\n" } ], "value": "\nDell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-16T11:58:56.346Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000206296/dsa-2022-204-dell-poweredge-improper-smm-communication-buffer-verification-vulnerability" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2022-34422", "datePublished": "2023-03-16T11:58:56.346Z", "dateReserved": "2022-06-23T18:55:17.112Z", "dateUpdated": "2024-08-03T09:07:16.314Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32461
Vulnerability from cvelistv5
Published
2023-09-15 06:56
Modified
2024-09-25 14:12
Severity ?
EPSS score ?
Summary
Dell PowerEdge BIOS and Dell Precision BIOS contain a buffer overflow vulnerability. A local malicious user with high privileges could potentially exploit this vulnerability, leading to corrupt memory and potentially escalate privileges.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Dell | PowerEdge Platform |
Version: Versions prior to 1.5.6 Version: Versions prior to 1.1.3 Version: Versions prior to 1.1.4 Version: Versions prior to 1.2.5 Version: Versions prior to 1.3.11 Version: Versions prior to 1.10.2 Version: Versions prior to 1.6.3 Version: Versions prior to 1.10.4 Version: Versions prior to 2.11.4 Version: Versions prior to 2.11.3 Version: Versions prior to Before 1.11.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:18:37.226Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000216543/dsa-2023-292-security-update-for-dell-poweredge-server-bios-vulnerability" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-32461", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-25T14:01:49.731484Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-25T14:12:53.858Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "BIOS", "platforms": [ "PowerEdge R660", "PowerEdge R760", "PowerEdge C6620", "PowerEdge MX760c", "PowerEdge R860", "PowerEdge R960", "PowerEdge HS5610", "PowerEdge HS5620", "PowerEdge R660xs", "PowerEdge R760xs", "PowerEdge R760xd2", "PowerEdge T560", "PowerEdge R760xa", "PowerEdge XE9680", "PowerEdge XR5610", "PowerEdge XR8620t", "PowerEdge XR7620", "PowerEdge XE8640", "PowerEdge R6615", "PowerEdge R7615", "PowerEdge R6625", "PowerEdge R7625", "PowerEdge R650", "PowerEdge R750", "PowerEdge R750XA", "PowerEdge C6520", "PowerEdge MX750C", "PowerEdge R550", "PowerEdge R450", "PowerEdge R650XS", "PowerEdge R750XS", "PowerEdge T550", "PowerEdge XR11", "PowerEdge XR12", "PowerEdge T150", "PowerEdge T350", "PowerEdge R250", "PowerEdge R350", "PowerEdge XR4510c", "PowerEdge XR4520c", "PowerEdge R6515", "PowerEdge R6525", "PowerEdge R7515", "PowerEdge R7525", "PowerEdge C6525", "PowerEdge XE8545", "Dell EMC XC Core XC450", "Dell EMC XC Core XC650", "Dell EMC XC Core XC750", "Dell EMC XC Core XC750xa", "Dell EMC XC Core XC6520", "Dell EMC XC Core XC7525" ], "product": "PowerEdge Platform", "vendor": "Dell", "versions": [ { "status": "affected", "version": "Versions prior to 1.5.6" }, { "status": "affected", "version": "Versions prior to 1.1.3" }, { "status": "affected", "version": "Versions prior to 1.1.4" }, { "status": "affected", "version": "Versions prior to 1.2.5" }, { "status": "affected", "version": "Versions prior to 1.3.11" }, { "status": "affected", "version": "Versions prior to 1.10.2" }, { "status": "affected", "version": "Versions prior to 1.6.3" }, { "status": "affected", "version": "Versions prior to 1.10.4" }, { "status": "affected", "version": "Versions prior to 2.11.4" }, { "status": "affected", "version": "Versions prior to 2.11.3" }, { "status": "affected", "version": "Versions prior to Before 1.11.2" } ] } ], "datePublic": "2023-09-14T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell PowerEdge BIOS and Dell Precision BIOS contain a buffer overflow vulnerability. A local malicious user with high privileges could potentially exploit this vulnerability, leading to corrupt memory and potentially escalate privileges. \u0026nbsp;\u003c/span\u003e\n\n" } ], "value": "\nDell PowerEdge BIOS and Dell Precision BIOS contain a buffer overflow vulnerability. A local malicious user with high privileges could potentially exploit this vulnerability, leading to corrupt memory and potentially escalate privileges. \u00a0\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122: Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-15T06:56:54.605Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000216543/dsa-2023-292-security-update-for-dell-poweredge-server-bios-vulnerability" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2023-32461", "datePublished": "2023-09-15T06:56:54.605Z", "dateReserved": "2023-05-09T06:05:24.994Z", "dateUpdated": "2024-09-25T14:12:53.858Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-0161
Vulnerability from cvelistv5
Published
2024-03-13 16:04
Modified
2024-08-12 13:56
Severity ?
EPSS score ?
Summary
Dell PowerEdge Server BIOS and Dell Precision Rack BIOS contain an Improper SMM communication buffer verification vulnerability. A local low privileged attacker could potentially exploit this vulnerability leading to arbitrary writes to SMRAM.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Dell | PowerEdge Platform |
Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T17:41:15.986Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000222979/dsa-2024-006-security-update-for-dell-poweredge-server-bios-for-an-improper-smm-communication-buffer-verification-vulnerability" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-0161", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-12T13:56:13.395413Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-12T13:56:29.418Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerEdge Platform", "vendor": "Dell", "versions": [ { "lessThan": "1.1.1", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.13.2", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.14.1", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.9.1", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "2.21.2", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "2.21.1", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "2.21.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "2.19.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "2.14.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.19.0\u00a0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "2.20.0", "status": "affected", "version": "N/A", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Dell would like to thank codebreaker1337 as well as schur of BUPT, Dubhe Lab for reporting this issue." } ], "datePublic": "2024-03-12T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Dell PowerEdge Server BIOS and Dell Precision Rack BIOS contain an Improper SMM communication buffer verification vulnerability. A local low privileged attacker could potentially exploit this vulnerability leading to arbitrary writes to SMRAM." } ], "value": "Dell PowerEdge Server BIOS and Dell Precision Rack BIOS contain an Improper SMM communication buffer verification vulnerability. A local low privileged attacker could potentially exploit this vulnerability leading to arbitrary writes to SMRAM." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-13T16:04:12.678Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000222979/dsa-2024-006-security-update-for-dell-poweredge-server-bios-for-an-improper-smm-communication-buffer-verification-vulnerability" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2024-0161", "datePublished": "2024-03-13T16:04:12.678Z", "dateReserved": "2023-12-14T05:30:39.766Z", "dateUpdated": "2024-08-12T13:56:29.418Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34418
Vulnerability from cvelistv5
Published
2023-03-16 11:52
Modified
2024-08-03 09:07
Severity ?
EPSS score ?
Summary
Dell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Dell | PowerEdge Platform |
Version: 14G,15G |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:07:16.249Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000206296/dsa-2022-204-dell-poweredge-improper-smm-communication-buffer-verification-vulnerability" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerEdge Platform", "vendor": "Dell", "versions": [ { "status": "affected", "version": "14G,15G" } ] } ], "datePublic": "2022-12-15T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.\u003c/span\u003e\n\n" } ], "value": "\nDell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-16T11:52:24.907Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000206296/dsa-2022-204-dell-poweredge-improper-smm-communication-buffer-verification-vulnerability" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2022-34418", "datePublished": "2023-03-16T11:52:24.907Z", "dateReserved": "2022-06-23T18:55:17.110Z", "dateUpdated": "2024-08-03T09:07:16.249Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34407
Vulnerability from cvelistv5
Published
2023-03-16 11:04
Modified
2024-08-03 09:07
Severity ?
EPSS score ?
Summary
Dell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Dell | PowerEdge Platform |
Version: 14G,15G |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:07:16.155Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000206296/dsa-2022-204-dell-poweredge-improper-smm-communication-buffer-verification-vulnerability" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerEdge Platform", "vendor": "Dell", "versions": [ { "status": "affected", "version": "14G,15G" } ] } ], "datePublic": "2022-12-15T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.\u003c/span\u003e\n\n" } ], "value": "\nDell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-16T11:04:32.170Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000206296/dsa-2022-204-dell-poweredge-improper-smm-communication-buffer-verification-vulnerability" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2022-34407", "datePublished": "2023-03-16T11:04:32.170Z", "dateReserved": "2022-06-23T18:55:17.102Z", "dateUpdated": "2024-08-03T09:07:16.155Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-25942
Vulnerability from cvelistv5
Published
2024-03-19 07:52
Modified
2024-08-12 13:53
Severity ?
EPSS score ?
Summary
Dell PowerEdge Server BIOS contains an Improper SMM communication buffer verification vulnerability. A physical high privileged attacker could potentially exploit this vulnerability leading to arbitrary writes to SMRAM.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Dell | PowerEdge Platform |
Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T23:52:06.241Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000223210/dsa-2024-104-security-update-for-dell-poweredge-server-bios-for-an-improper-smm-communication-buffer-verification-vulnerability" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-25942", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-12T13:53:19.426811Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-12T13:53:37.973Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerEdge Platform", "vendor": "Dell", "versions": [ { "lessThan": "2.19.0\u00a0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "2.14.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.19.0", "status": "affected", "version": "N/A", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Dell would like to thank schur of BUPT, Dubhe Lab for reporting this issue." } ], "datePublic": "2024-03-18T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Dell PowerEdge Server BIOS contains an Improper SMM communication buffer verification vulnerability. A physical high privileged attacker could potentially exploit this vulnerability leading to arbitrary writes to SMRAM." } ], "value": "Dell PowerEdge Server BIOS contains an Improper SMM communication buffer verification vulnerability. A physical high privileged attacker could potentially exploit this vulnerability leading to arbitrary writes to SMRAM." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "LOW", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-19T07:52:29.228Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000223210/dsa-2024-104-security-update-for-dell-poweredge-server-bios-for-an-improper-smm-communication-buffer-verification-vulnerability" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2024-25942", "datePublished": "2024-03-19T07:52:29.228Z", "dateReserved": "2024-02-13T05:29:58.481Z", "dateUpdated": "2024-08-12T13:53:37.973Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34406
Vulnerability from cvelistv5
Published
2023-03-16 11:00
Modified
2024-08-03 09:07
Severity ?
EPSS score ?
Summary
Dell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Dell | PowerEdge Platform |
Version: 14G,15G |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:07:16.231Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000206296/dsa-2022-204-dell-poweredge-improper-smm-communication-buffer-verification-vulnerability" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerEdge Platform", "vendor": "Dell", "versions": [ { "status": "affected", "version": "14G,15G" } ] } ], "datePublic": "2022-12-15T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.\u003c/span\u003e\n\n" } ], "value": "\nDell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-16T11:00:25.319Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000206296/dsa-2022-204-dell-poweredge-improper-smm-communication-buffer-verification-vulnerability" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2022-34406", "datePublished": "2023-03-16T11:00:25.319Z", "dateReserved": "2022-06-23T18:55:17.101Z", "dateUpdated": "2024-08-03T09:07:16.231Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34412
Vulnerability from cvelistv5
Published
2023-03-16 11:33
Modified
2024-08-03 09:07
Severity ?
EPSS score ?
Summary
Dell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Dell | PowerEdge Platform |
Version: 14G,15G |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:07:16.315Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000206296/dsa-2022-204-dell-poweredge-improper-smm-communication-buffer-verification-vulnerability" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerEdge Platform", "vendor": "Dell", "versions": [ { "status": "affected", "version": "14G,15G" } ] } ], "datePublic": "2022-12-15T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.\u003c/span\u003e\n\n" } ], "value": "\nDell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-16T11:33:34.235Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000206296/dsa-2022-204-dell-poweredge-improper-smm-communication-buffer-verification-vulnerability" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2022-34412", "datePublished": "2023-03-16T11:33:34.235Z", "dateReserved": "2022-06-23T18:55:17.107Z", "dateUpdated": "2024-08-03T09:07:16.315Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-0173
Vulnerability from cvelistv5
Published
2024-03-13 16:52
Modified
2024-08-01 17:41
Severity ?
EPSS score ?
Summary
Dell PowerEdge Server BIOS and Dell Precision Rack BIOS contain an improper parameter initialization vulnerability. A local low privileged attacker could potentially exploit this vulnerability to read the contents of non-SMM stack memory.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Dell | PowerEdge Platform |
Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-0173", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-03-13T20:00:50.556667Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:58:23.919Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T17:41:16.066Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000222898/dsa-2024-034-security-update-for-dell-poweredge-server-bios-for-an-improper-parameter-initialization-vulnerability" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerEdge Platform\t", "vendor": "Dell", "versions": [ { "lessThan": "2.0.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.7.6", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.7.2", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.2.3", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.13.2", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.14.1", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.9.1", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "2.14.1", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "2.21.2", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "2.21.1", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "2.21.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "2.16.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "2.19.0\u00a0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "2.14.0\u00a0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.19.0\u00a0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "2.20.0\u202f\u00a0", "status": "affected", "version": "N/A", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Dell would like to thank codebreaker1337 for reporting this issue." } ], "datePublic": "2024-03-12T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Dell PowerEdge Server BIOS and Dell Precision Rack BIOS contain an improper parameter initialization vulnerability. A local low privileged attacker could potentially exploit this vulnerability to read the contents of non-SMM stack memory." } ], "value": "Dell PowerEdge Server BIOS and Dell Precision Rack BIOS contain an improper parameter initialization vulnerability. A local low privileged attacker could potentially exploit this vulnerability to read the contents of non-SMM stack memory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-788", "description": "CWE-788: Access of Memory Location After End of Buffer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-13T16:52:21.293Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000222898/dsa-2024-034-security-update-for-dell-poweredge-server-bios-for-an-improper-parameter-initialization-vulnerability" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2024-0173", "datePublished": "2024-03-13T16:52:21.293Z", "dateReserved": "2023-12-14T05:35:37.836Z", "dateUpdated": "2024-08-01T17:41:16.066Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-38304
Vulnerability from cvelistv5
Published
2024-08-29 08:03
Modified
2024-08-29 13:28
Severity ?
EPSS score ?
Summary
Dell PowerEdge Platform, 14G Intel BIOS version(s) prior to 2.22.x, contains an Access of Memory Location After End of Buffer vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Information disclosure.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Dell | PowerEdge Platform |
Version: N/A ≤ Version: N/A ≤ |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-38304", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-29T13:28:25.124614Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-29T13:28:35.429Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerEdge Platform", "vendor": "Dell", "versions": [ { "lessThan": "2.22.1", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "2.22.0", "status": "affected", "version": "N/A", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Dell would like to thank codebreaker1337 for reporting this issue." } ], "datePublic": "2024-08-28T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Dell PowerEdge Platform, 14G Intel BIOS version(s) prior to 2.22.x, contains an Access of Memory Location After End of Buffer vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Information disclosure." } ], "value": "Dell PowerEdge Platform, 14G Intel BIOS version(s) prior to 2.22.x, contains an Access of Memory Location After End of Buffer vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Information disclosure." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-788", "description": "CWE-788: Access of Memory Location After End of Buffer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-29T08:03:40.261Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000228137/dsa-2024-310-security-update-for-dell-poweredge-server-for-access-of-memory-location-after-end-of-buffer-vulnerability" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2024-38304", "datePublished": "2024-08-29T08:03:40.261Z", "dateReserved": "2024-06-13T14:41:01.527Z", "dateUpdated": "2024-08-29T13:28:35.429Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34419
Vulnerability from cvelistv5
Published
2023-03-16 11:54
Modified
2024-08-03 09:07
Severity ?
EPSS score ?
Summary
Dell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Dell | PowerEdge Platform |
Version: 14G,15G |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:07:16.158Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000206296/dsa-2022-204-dell-poweredge-improper-smm-communication-buffer-verification-vulnerability" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerEdge Platform", "vendor": "Dell", "versions": [ { "status": "affected", "version": "14G,15G" } ] } ], "datePublic": "2022-12-15T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.\u003c/span\u003e\n\n" } ], "value": "\nDell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-16T11:54:01.719Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000206296/dsa-2022-204-dell-poweredge-improper-smm-communication-buffer-verification-vulnerability" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2022-34419", "datePublished": "2023-03-16T11:54:01.719Z", "dateReserved": "2022-06-23T18:55:17.111Z", "dateUpdated": "2024-08-03T09:07:16.158Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34411
Vulnerability from cvelistv5
Published
2023-03-16 11:31
Modified
2024-08-03 09:07
Severity ?
EPSS score ?
Summary
Dell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Dell | PowerEdge Platform |
Version: 14G,15G |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:07:16.239Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000206296/dsa-2022-204-dell-poweredge-improper-smm-communication-buffer-verification-vulnerability" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerEdge Platform", "vendor": "Dell", "versions": [ { "status": "affected", "version": "14G,15G" } ] } ], "datePublic": "2022-12-15T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.\u003c/span\u003e\n\n" } ], "value": "\nDell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-16T11:31:33.840Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000206296/dsa-2022-204-dell-poweredge-improper-smm-communication-buffer-verification-vulnerability" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2022-34411", "datePublished": "2023-03-16T11:31:33.840Z", "dateReserved": "2022-06-23T18:55:17.106Z", "dateUpdated": "2024-08-03T09:07:16.239Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-0172
Vulnerability from cvelistv5
Published
2024-04-03 09:09
Modified
2024-08-20 20:30
Severity ?
EPSS score ?
Summary
Dell PowerEdge Server BIOS and Dell Precision Rack BIOS contain an improper privilege management security vulnerability. An unauthenticated local attacker could potentially exploit this vulnerability, leading to privilege escalation.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Dell | PowerEdge Platform |
Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T17:41:16.006Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000223727/dsa-2024-035-security-update-for-dell-poweredge-server-bios-for-an-improper-privilege-management-security-vulnerability" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:o:dell:poweredge_r660_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_r660_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.5.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_r760_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_r760_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.5.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_c6620_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_c6620_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.5.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_mx760c_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_mx760c_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.5.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_r860_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_r860_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.5.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_r960_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_r960_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.5.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_hs5610_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_hs5610_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.5.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_hs5620_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_hs5620_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.5.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_r660xs_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_r660xs_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.5.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_r760xs_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_r760xs_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.5.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_r760xd2_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_r760xd2_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.5.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_t560_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_t560_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.5.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_r760xa_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_r760xa_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.1.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_xe9680_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_xe9680_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.1.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_xr5610_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_xr5610_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.1.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_xr8620t_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_xr8620t_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.1.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_xr7620_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_xr7620_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.5.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_xe8640_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_xe8640_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.2.5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_xe9640_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_xe9640_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.3.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_r6615_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_r6615_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.4.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_r7615_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_r7615_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.4.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_r6625_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_r6625_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.4.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_r7625_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_r7625_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.4.6", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_r650_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_r650_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.11.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_r750_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_r750_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.11.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_r750xa_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_r750xa_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.11.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_c6520_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_c6520_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.11.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_mx750c_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_mx750c_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.11.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_r550_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_r550_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.11.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_r450_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_r450_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.11.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_r650xs_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_r650xs_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.11.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_r750xs_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_r750xs_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.11.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_t550_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_t550_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.11.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_xr11_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_xr11_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.11.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_xr12_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_xr12_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.11.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_t150_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_t150_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.7.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_t350_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_t350_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.7.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_r250_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_r250_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.7.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_r350_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_r350_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.7.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_xr4510c_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_xr4510c_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.12.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_xr4520c_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_xr4520c_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.12.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_r6515_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_r6515_firmware", "vendor": "dell", "versions": [ { "lessThan": "2.12.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_r6525_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_r6525_firmware", "vendor": "dell", "versions": [ { "lessThan": "2.12.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_r7515_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_r7515_firmware", "vendor": "dell", "versions": [ { "lessThan": "2.12.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_r7525_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_r7525_firmware", "vendor": "dell", "versions": [ { "lessThan": "2.12.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_c6525_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_c6525_firmware", "vendor": "dell", "versions": [ { "lessThan": "2.12.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_xe8545_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_xe8545_firmware", "vendor": "dell", "versions": [ { "lessThan": "2.12.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_r740_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_r740_firmware", "vendor": "dell", "versions": [ { "lessThan": "2.19.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_r740xd_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_r740xd_firmware", "vendor": "dell", "versions": [ { "lessThan": "2.19.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_r640_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_r640_firmware", "vendor": "dell", "versions": [ { "lessThan": "2.19.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_r940_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_r940_firmware", "vendor": "dell", "versions": [ { "lessThan": "2.19.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_r540_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_r540_firmware", "vendor": "dell", "versions": [ { "lessThan": "2.19.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_r440_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_r440_firmware", "vendor": "dell", "versions": [ { "lessThan": "2.19.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_t440_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_t440_firmware", "vendor": "dell", "versions": [ { "lessThan": "2.19.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_xr2_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_xr2_firmware", "vendor": "dell", "versions": [ { "lessThan": "2.19.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_r740xd2_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_r740xd2_firmware", "vendor": "dell", "versions": [ { "lessThan": "2.19.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_r840_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_r840_firmware", "vendor": "dell", "versions": [ { "lessThan": "2.19.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_r940xa_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_r940xa_firmware", "vendor": "dell", "versions": [ { "lessThan": "2.19.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_t640_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_t640_firmware", "vendor": "dell", "versions": [ { "lessThan": "2.19.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_c6420_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_c6420_firmware", "vendor": "dell", "versions": [ { "lessThan": "2.19.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_fc640_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_fc640_firmware", "vendor": "dell", "versions": [ { "lessThan": "2.19.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_m640_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_m640_firmware", "vendor": "dell", "versions": [ { "lessThan": "2.19.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_mx740c_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_mx740c_firmware", "vendor": "dell", "versions": [ { "lessThan": "2.19.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_mx840c_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_mx840c_firmware", "vendor": "dell", "versions": [ { "lessThan": "2.19.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_c4140_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_c4140_firmware", "vendor": "dell", "versions": [ { "lessThan": "2.19.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_xe2420_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_xe2420_firmware", "vendor": "dell", "versions": [ { "lessThan": "2.19.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_xe7420_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_xe7420_firmware", "vendor": "dell", "versions": [ { "lessThan": "2.19.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_xe7440_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_xe7440_firmware", "vendor": "dell", "versions": [ { "lessThan": "2.19.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_t140_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_t140_firmware", "vendor": "dell", "versions": [ { "lessThan": "2.14.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_t340_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_t340_firmware", "vendor": "dell", "versions": [ { "lessThan": "2.14.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_r240_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_r240_firmware", "vendor": "dell", "versions": [ { "lessThan": "2.14.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_r340_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_r340_firmware", "vendor": "dell", "versions": [ { "lessThan": "2.14.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_r6415_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_r6415_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.20.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_r7415_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_r7415_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.20.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:poweredge_r7425_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "poweredge_r7425_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.20.0", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:emc_storage_nx3240_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emc_storage_nx3240_firmware", "vendor": "dell", "versions": [ { "lessThan": "2.19.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:emc_storage_nx3340_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emc_storage_nx3340_firmware", "vendor": "dell", "versions": [ { "lessThan": "2.19.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:emc_xc_core_xc450_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emc_xc_core_xc450_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.11.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:emc_xc_core_xc650_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emc_xc_core_xc650_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.11.2", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:dell:emc_xc_core_xc750_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "emc_xc_core_xc750_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.11.2", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-0172", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-04-11T04:01:19.460976Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-20T20:30:48.954Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerEdge Platform", "vendor": "Dell", "versions": [ { "lessThan": "1.5.6", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.1.3", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.1.4", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.2.5", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.3.6", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.4.6", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.11.2", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.7.3", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.12.1", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "2.12.4", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "2.19.1", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "2.19.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "2.14.1", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.20.0", "status": "affected", "version": "N/A", "versionType": "semver" } ] } ], "datePublic": "2024-04-02T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Dell PowerEdge Server BIOS and Dell Precision Rack BIOS contain an improper privilege management security vulnerability. An unauthenticated local attacker could potentially exploit this vulnerability, leading to privilege escalation." } ], "value": "Dell PowerEdge Server BIOS and Dell Precision Rack BIOS contain an improper privilege management security vulnerability. An unauthenticated local attacker could potentially exploit this vulnerability, leading to privilege escalation." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 7.9, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269: Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-03T09:09:18.449Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000223727/dsa-2024-035-security-update-for-dell-poweredge-server-bios-for-an-improper-privilege-management-security-vulnerability" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2024-0172", "datePublished": "2024-04-03T09:09:18.449Z", "dateReserved": "2023-12-14T05:35:36.325Z", "dateUpdated": "2024-08-20T20:30:48.954Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34417
Vulnerability from cvelistv5
Published
2023-03-16 11:50
Modified
2024-08-03 09:07
Severity ?
EPSS score ?
Summary
Dell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Dell | PowerEdge Platform |
Version: 14G,15G |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:07:16.279Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000206296/dsa-2022-204-dell-poweredge-improper-smm-communication-buffer-verification-vulnerability" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerEdge Platform", "vendor": "Dell", "versions": [ { "status": "affected", "version": "14G,15G" } ] } ], "datePublic": "2022-12-15T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.\u003c/span\u003e\n\n" } ], "value": "\nDell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-16T11:50:19.823Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000206296/dsa-2022-204-dell-poweredge-improper-smm-communication-buffer-verification-vulnerability" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2022-34417", "datePublished": "2023-03-16T11:50:19.823Z", "dateReserved": "2022-06-23T18:55:17.110Z", "dateUpdated": "2024-08-03T09:07:16.279Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-38303
Vulnerability from cvelistv5
Published
2024-08-29 04:34
Modified
2024-08-29 13:49
Severity ?
EPSS score ?
Summary
Dell PowerEdge Platform, 14G Intel BIOS version(s) prior to 2.22.x, contains an Improper Input Validation vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Information disclosure.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Dell | PowerEdge Platform |
Version: N/A ≤ Version: N/A ≤ |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-38303", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-29T13:49:25.085284Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-29T13:49:36.661Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerEdge Platform", "vendor": "Dell", "versions": [ { "lessThan": "2.22.1", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "2.22.0", "status": "affected", "version": "N/A", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Dell would like to thank codebreaker1337 for reporting this issue." } ], "datePublic": "2024-08-28T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Dell PowerEdge Platform, 14G Intel BIOS version(s) prior to 2.22.x, contains an Improper Input Validation vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Information disclosure." } ], "value": "Dell PowerEdge Platform, 14G Intel BIOS version(s) prior to 2.22.x, contains an Improper Input Validation vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Information disclosure." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-29T04:34:53.178Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000228135/dsa-2024-309-security-update-for-dell-poweredge-server-for-improper-input-validation-vulnerability" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2024-38303", "datePublished": "2024-08-29T04:34:53.178Z", "dateReserved": "2024-06-13T14:41:01.527Z", "dateUpdated": "2024-08-29T13:49:36.661Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34376
Vulnerability from cvelistv5
Published
2023-02-10 19:22
Modified
2024-08-03 09:07
Severity ?
EPSS score ?
Summary
Dell PowerEdge BIOS and Dell Precision BIOS contain an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by manipulating an SMI to cause a denial of service during SMM.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Dell | PowerEdge Platform |
Version: 14G,15G |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:07:16.140Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000206296/dsa-2022-204-dell-poweredge-improper-smm-communication-buffer-verification-vulnerability" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerEdge Platform", "vendor": "Dell", "versions": [ { "status": "affected", "version": "14G,15G" } ] } ], "datePublic": "2022-12-15T17:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cdiv\u003e\u003cdiv\u003e\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell PowerEdge BIOS and Dell Precision BIOS contain an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by manipulating an SMI to cause a denial of service during SMM.\u003c/span\u003e\n\n\u003c/div\u003e\u003c/div\u003e\n\n" } ], "value": "\n\n\nDell PowerEdge BIOS and Dell Precision BIOS contain an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by manipulating an SMI to cause a denial of service during SMM.\n\n\n\n\n\n\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.9, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-16T12:17:59.414Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000206296/dsa-2022-204-dell-poweredge-improper-smm-communication-buffer-verification-vulnerability" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2022-34376", "datePublished": "2023-02-10T19:22:19.258Z", "dateReserved": "2022-06-23T18:55:17.088Z", "dateUpdated": "2024-08-03T09:07:16.140Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34420
Vulnerability from cvelistv5
Published
2023-03-16 11:55
Modified
2024-08-03 09:07
Severity ?
EPSS score ?
Summary
Dell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Dell | PowerEdge Platform |
Version: 14G,15G |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:07:16.233Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000206296/dsa-2022-204-dell-poweredge-improper-smm-communication-buffer-verification-vulnerability" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerEdge Platform", "vendor": "Dell", "versions": [ { "status": "affected", "version": "14G,15G" } ] } ], "datePublic": "2022-12-15T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.\u003c/span\u003e\n\n" } ], "value": "\nDell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-16T11:55:42.091Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000206296/dsa-2022-204-dell-poweredge-improper-smm-communication-buffer-verification-vulnerability" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2022-34420", "datePublished": "2023-03-16T11:55:42.091Z", "dateReserved": "2022-06-23T18:55:17.111Z", "dateUpdated": "2024-08-03T09:07:16.233Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-0171
Vulnerability from cvelistv5
Published
2024-06-25 15:30
Modified
2024-08-01 17:41
Severity ?
EPSS score ?
Summary
Dell PowerEdge Server BIOS contains an TOCTOU race condition vulnerability. A local low privileged attacker could potentially exploit this vulnerability to gain access to otherwise unauthorized resources.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Dell | PowerEdge Platform |
Version: N/A ≤ Version: N/A ≤ |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-0171", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-25T19:45:39.986656Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-25T19:45:49.921Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T17:41:15.984Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000226253/dsa-2024-039-security-update-for-dell-amd-based-poweredge-server-vulnerability" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerEdge Platform", "vendor": "Dell", "versions": [ { "lessThan": "1.8.3", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.3.3", "status": "affected", "version": "N/A", "versionType": "semver" } ] } ], "datePublic": "2024-06-24T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Dell PowerEdge Server BIOS contains an TOCTOU race condition vulnerability. A local low privileged attacker could potentially exploit this vulnerability to gain access to otherwise unauthorized resources." } ], "value": "Dell PowerEdge Server BIOS contains an TOCTOU race condition vulnerability. A local low privileged attacker could potentially exploit this vulnerability to gain access to otherwise unauthorized resources." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-367", "description": "CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-25T15:30:42.589Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000226253/dsa-2024-039-security-update-for-dell-amd-based-poweredge-server-vulnerability" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2024-0171", "datePublished": "2024-06-25T15:30:42.589Z", "dateReserved": "2023-12-14T05:35:34.949Z", "dateUpdated": "2024-08-01T17:41:15.984Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-22453
Vulnerability from cvelistv5
Published
2024-03-19 07:42
Modified
2024-08-01 22:43
Severity ?
EPSS score ?
Summary
Dell PowerEdge Server BIOS contains a heap-based buffer overflow vulnerability. A local high privileged attacker could potentially exploit this vulnerability to write to otherwise unauthorized memory.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Dell | PowerEdge Platform |
Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-22453", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-03-19T14:44:45.916921Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:52:52.907Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T22:43:34.929Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000223209/dsa-2024-105-security-update-for-dell-poweredge-server-bios-for-a-heap-based-buffer-overflow-vulnerability" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerEdge Platform", "vendor": "Dell", "versions": [ { "lessThan": "2.19.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "2.14.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.19.0", "status": "affected", "version": "N/A", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Dell would like to thank schur of BUPT, Dubhe Lab for reporting this issue" } ], "datePublic": "2024-03-18T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Dell PowerEdge Server BIOS contains a heap-based buffer overflow vulnerability. A local high privileged attacker could potentially exploit this vulnerability to write to otherwise unauthorized memory." } ], "value": "Dell PowerEdge Server BIOS contains a heap-based buffer overflow vulnerability. A local high privileged attacker could potentially exploit this vulnerability to write to otherwise unauthorized memory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122: Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-19T07:42:27.785Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000223209/dsa-2024-105-security-update-for-dell-poweredge-server-bios-for-a-heap-based-buffer-overflow-vulnerability" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2024-22453", "datePublished": "2024-03-19T07:42:27.785Z", "dateReserved": "2024-01-10T15:26:10.251Z", "dateUpdated": "2024-08-01T22:43:34.929Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34421
Vulnerability from cvelistv5
Published
2023-03-16 11:57
Modified
2024-08-03 09:07
Severity ?
EPSS score ?
Summary
Dell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Dell | PowerEdge Platform |
Version: 14G,15G |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:07:16.161Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000206296/dsa-2022-204-dell-poweredge-improper-smm-communication-buffer-verification-vulnerability" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerEdge Platform", "vendor": "Dell", "versions": [ { "status": "affected", "version": "14G,15G" } ] } ], "datePublic": "2022-12-15T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.\u003c/span\u003e\n\n" } ], "value": "\nDell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-16T11:57:14.398Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000206296/dsa-2022-204-dell-poweredge-improper-smm-communication-buffer-verification-vulnerability" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2022-34421", "datePublished": "2023-03-16T11:57:14.398Z", "dateReserved": "2022-06-23T18:55:17.112Z", "dateUpdated": "2024-08-03T09:07:16.161Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34377
Vulnerability from cvelistv5
Published
2023-02-10 19:55
Modified
2024-08-03 09:07
Severity ?
EPSS score ?
Summary
Dell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Dell | PowerEdge Platform |
Version: BIOS 13G Intel 1S/2S and 14G AMD |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:07:16.293Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000206296/dsa-2022-204-dell-poweredge-improper-smm-communication-buffer-verification-vulnerability" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerEdge Platform", "vendor": "Dell", "versions": [ { "status": "affected", "version": "BIOS 13G Intel 1S/2S and 14G AMD" } ] } ], "datePublic": "2022-12-15T17:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cdiv\u003e\u003cdiv\u003e\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.\u003c/span\u003e\n\n\u003c/div\u003e\u003c/div\u003e\n\n" } ], "value": "\n\n\nDell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.\n\n\n\n\n\n\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 1.9, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-16T12:15:59.903Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000206296/dsa-2022-204-dell-poweredge-improper-smm-communication-buffer-verification-vulnerability" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2022-34377", "datePublished": "2023-02-10T19:55:51.180Z", "dateReserved": "2022-06-23T18:55:17.088Z", "dateUpdated": "2024-08-03T09:07:16.293Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34416
Vulnerability from cvelistv5
Published
2023-03-16 11:48
Modified
2024-08-03 09:07
Severity ?
EPSS score ?
Summary
Dell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Dell | PowerEdge Platform |
Version: 14G,15G |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:07:16.164Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000206296/dsa-2022-204-dell-poweredge-improper-smm-communication-buffer-verification-vulnerability" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerEdge Platform", "vendor": "Dell", "versions": [ { "status": "affected", "version": "14G,15G" } ] } ], "datePublic": "2022-12-15T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.\u003c/span\u003e\n\n" } ], "value": "\nDell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-16T11:48:20.844Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000206296/dsa-2022-204-dell-poweredge-improper-smm-communication-buffer-verification-vulnerability" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2022-34416", "datePublished": "2023-03-16T11:48:20.844Z", "dateReserved": "2022-06-23T18:55:17.109Z", "dateUpdated": "2024-08-03T09:07:16.164Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34409
Vulnerability from cvelistv5
Published
2023-03-16 11:26
Modified
2024-08-03 09:07
Severity ?
EPSS score ?
Summary
Dell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Dell | PowerEdge Platform |
Version: 14G,15G |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:07:16.288Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000206296/dsa-2022-204-dell-poweredge-improper-smm-communication-buffer-verification-vulnerability" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerEdge Platform", "vendor": "Dell", "versions": [ { "status": "affected", "version": "14G,15G" } ] } ], "datePublic": "2022-12-15T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.\u003c/span\u003e\n\n" } ], "value": "\nDell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-16T11:26:00.563Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000206296/dsa-2022-204-dell-poweredge-improper-smm-communication-buffer-verification-vulnerability" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2022-34409", "datePublished": "2023-03-16T11:26:00.563Z", "dateReserved": "2022-06-23T18:55:17.103Z", "dateUpdated": "2024-08-03T09:07:16.288Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34423
Vulnerability from cvelistv5
Published
2023-03-16 12:21
Modified
2024-08-03 09:07
Severity ?
EPSS score ?
Summary
Dell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Dell | PowerEdge Platform |
Version: 14G,15G |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:07:16.144Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000206296/dsa-2022-204-dell-poweredge-improper-smm-communication-buffer-verification-vulnerability" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerEdge Platform", "vendor": "Dell", "versions": [ { "status": "affected", "version": "14G,15G" } ] } ], "datePublic": "2022-12-15T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.\u003c/span\u003e\n\n" } ], "value": "\nDell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-16T12:21:18.567Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000206296/dsa-2022-204-dell-poweredge-improper-smm-communication-buffer-verification-vulnerability" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2022-34423", "datePublished": "2023-03-16T12:21:18.567Z", "dateReserved": "2022-06-23T18:55:17.113Z", "dateUpdated": "2024-08-03T09:07:16.144Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-0154
Vulnerability from cvelistv5
Published
2024-03-13 16:41
Modified
2024-08-01 17:41
Severity ?
EPSS score ?
Summary
Dell PowerEdge Server BIOS and Dell Precision Rack BIOS contain an improper parameter initialization vulnerability. A local low privileged attacker could potentially exploit this vulnerability to read the contents of non-SMM stack memory.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Dell | PowerEdge Platform |
Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ Version: N/A ≤ |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-0154", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-03-13T19:40:48.987776Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:58:45.175Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T17:41:16.006Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000222898/dsa-2024-034-security-update-for-dell-poweredge-server-bios-for-an-improper-parameter-initialization-vulnerability" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerEdge Platform", "vendor": "Dell", "versions": [ { "lessThan": "2.0.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.7.6", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.7.2", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.2.3", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.13.2", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.14.1", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.9.1", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "2.14.1", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "2.21.2", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "2.21.1", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "2.21.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "2.16.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "2.19.0\u00a0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "2.14.0\u00a0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.19.0\u00a0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "2.20.0\u202f", "status": "affected", "version": "N/A", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Dell would like to thank codebreaker1337 for reporting this issue." } ], "datePublic": "2024-03-12T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Dell PowerEdge Server BIOS and Dell Precision Rack BIOS contain an improper parameter initialization vulnerability. A local low privileged attacker could potentially exploit this vulnerability to read the contents of non-SMM stack memory." } ], "value": "Dell PowerEdge Server BIOS and Dell Precision Rack BIOS contain an improper parameter initialization vulnerability. A local low privileged attacker could potentially exploit this vulnerability to read the contents of non-SMM stack memory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-788", "description": "CWE-788: Access of Memory Location After End of Buffer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-13T16:41:09.360Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000222898/dsa-2024-034-security-update-for-dell-poweredge-server-bios-for-an-improper-parameter-initialization-vulnerability" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2024-0154", "datePublished": "2024-03-13T16:41:09.360Z", "dateReserved": "2023-12-14T05:29:25.760Z", "dateUpdated": "2024-08-01T17:41:16.006Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-22558
Vulnerability from cvelistv5
Published
2022-04-21 20:50
Modified
2024-09-17 01:56
Severity ?
EPSS score ?
Summary
Dell PowerEdge Server BIOS and Dell Precision Workstation 7910 and 7920 Rack BIOS contain an Improper SMM communication buffer verification vulnerability. A Local High Privileged attacker could potentially exploit this vulnerability leading to arbitrary writes or denial of service.
References
▼ | URL | Tags |
---|---|---|
https://www.dell.com/support/kbdoc/000197971 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Dell | PowerEdge Platform |
Version: unspecified < BIOS update for PowerEdge 13G Intel 1S/2S and 14G AMD |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:14:55.684Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/000197971" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "PowerEdge Platform", "vendor": "Dell", "versions": [ { "lessThan": "BIOS update for PowerEdge 13G Intel 1S/2S and 14G AMD", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-08-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Dell PowerEdge Server BIOS and Dell Precision Workstation 7910 and 7920 Rack BIOS contain an Improper SMM communication buffer verification vulnerability. A Local High Privileged attacker could potentially exploit this vulnerability leading to arbitrary writes or denial of service." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-01T18:45:16", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.dell.com/support/kbdoc/000197971" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@dell.com", "DATE_PUBLIC": "2022-08-04", "ID": "CVE-2022-22558", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "PowerEdge Platform", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "BIOS update for PowerEdge 13G Intel 1S/2S and 14G AMD" } ] } } ] }, "vendor_name": "Dell" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Dell PowerEdge Server BIOS and Dell Precision Workstation 7910 and 7920 Rack BIOS contain an Improper SMM communication buffer verification vulnerability. A Local High Privileged attacker could potentially exploit this vulnerability leading to arbitrary writes or denial of service." } ] }, "impact": { "cvss": { "baseScore": 5.7, "baseSeverity": "Medium", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.dell.com/support/kbdoc/000197971", "refsource": "MISC", "url": "https://www.dell.com/support/kbdoc/000197971" } ] } } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2022-22558", "datePublished": "2022-04-21T20:50:13.669444Z", "dateReserved": "2022-01-04T00:00:00", "dateUpdated": "2024-09-17T01:56:31.669Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34408
Vulnerability from cvelistv5
Published
2023-03-16 11:07
Modified
2024-08-03 09:07
Severity ?
EPSS score ?
Summary
Dell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Dell | PowerEdge Platform |
Version: 14G,15G |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:07:16.240Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000206296/dsa-2022-204-dell-poweredge-improper-smm-communication-buffer-verification-vulnerability" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerEdge Platform", "vendor": "Dell", "versions": [ { "status": "affected", "version": "14G,15G" } ] } ], "datePublic": "2022-12-15T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.\u003c/span\u003e\n\n" } ], "value": "\nDell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-16T11:07:12.263Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000206296/dsa-2022-204-dell-poweredge-improper-smm-communication-buffer-verification-vulnerability" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2022-34408", "datePublished": "2023-03-16T11:07:12.263Z", "dateReserved": "2022-06-23T18:55:17.102Z", "dateUpdated": "2024-08-03T09:07:16.240Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32460
Vulnerability from cvelistv5
Published
2023-12-08 05:37
Modified
2024-08-02 15:18
Severity ?
EPSS score ?
Summary
Dell PowerEdge BIOS contains an improper privilege management security vulnerability. An unauthenticated local attacker could potentially exploit this vulnerability, leading to privilege escalation.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Dell | PowerEdge Platform |
Version: Versions prior to 1.6.6 Version: Versions prior to 1.3.6 Version: Versions prior to 1.1.2 Version: Versions prior to 1.12.1 Version: Versions prior to 1.8.1 Version: Versions prior to 1.13.3 Version: Versions prior to 2.13.3 Version: Versions prior to 2.20.1 Version: Versions prior to 2.20.0 Version: Versions prior to 2.15.1 Version: Versions prior to 1.21.0 Version: Versions prior to 2.18.1 Version: Versions prior to 2.13.0 Version: Versions prior to 2.18.2 Version: Versions prior to 1.18.1 Version: Versions prior to 2.19.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:18:37.251Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000219550/dsa-2023-361-security-update-for-dell-poweredge-server-bios-for-an-improper-privilege-management-security-vulnerability" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "BIOS" ], "product": "PowerEdge Platform", "vendor": "Dell", "versions": [ { "status": "affected", "version": "Versions prior to 1.6.6" }, { "status": "affected", "version": "Versions prior to 1.3.6" }, { "status": "affected", "version": "Versions prior to 1.1.2" }, { "status": "affected", "version": "Versions prior to 1.12.1" }, { "status": "affected", "version": "Versions prior to 1.8.1" }, { "status": "affected", "version": "Versions prior to 1.13.3" }, { "status": "affected", "version": "Versions prior to 2.13.3" }, { "status": "affected", "version": "Versions prior to 2.20.1" }, { "status": "affected", "version": "Versions prior to 2.20.0" }, { "status": "affected", "version": "Versions prior to 2.15.1" }, { "status": "affected", "version": "Versions prior to 1.21.0" }, { "status": "affected", "version": "Versions prior to 2.18.1 " }, { "status": "affected", "version": "Versions prior to 2.13.0\u202f " }, { "status": "affected", "version": "Versions prior to 2.18.2 " }, { "status": "affected", "version": "Versions prior to 1.18.1\u202f " }, { "status": "affected", "version": "Versions prior to 2.19.1\u202f " } ] } ], "datePublic": "2023-12-07T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell PowerEdge BIOS contains an improper privilege management security vulnerability. An unauthenticated local attacker could potentially exploit this vulnerability, leading to privilege escalation.\u003c/span\u003e\n\n" } ], "value": "\nDell PowerEdge BIOS contains an improper privilege management security vulnerability. An unauthenticated local attacker could potentially exploit this vulnerability, leading to privilege escalation.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306: Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-08T05:37:52.680Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000219550/dsa-2023-361-security-update-for-dell-poweredge-server-bios-for-an-improper-privilege-management-security-vulnerability" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2023-32460", "datePublished": "2023-12-08T05:37:52.680Z", "dateReserved": "2023-05-09T06:05:24.994Z", "dateUpdated": "2024-08-02T15:18:37.251Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-25537
Vulnerability from cvelistv5
Published
2023-05-22 10:48
Modified
2024-08-02 11:25
Severity ?
EPSS score ?
Summary
Dell PowerEdge 14G server BIOS versions prior to 2.18.1 and Dell Precision BIOS versions prior to 2.18.2, contain an Out of Bounds write vulnerability. A local attacker with low privileges could potentially exploit this vulnerability leading to exposure of some SMRAM stack/data/code in System Management Mode, leading to arbitrary code execution or escalation of privilege.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Dell | PowerEdge Platform |
Version: Versions prior to 2.18.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T11:25:18.634Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000213550/dsa-2023-098-security-update-for-dell-poweredge-14g-server-bios-for-an-out-of-bounds-write-vulnerability" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "BIOS", "PowerEdge R740", "PowerEdge R740XD", "PowerEdge R640", "PowerEdge R940", "PowerEdge R540", "PowerEdge R440", "PowerEdge T440", "PowerEdge XR2", "PowerEdge R740xD2", "PowerEdge R840", "PowerEdge R940xa", "PowerEdge T640", "PowerEdge C6420", "PowerEdge FC640", "PowerEdge M640", "PowerEdge M640 (for PE VRTX)", "PowerEdge MX740c", "PowerEdge MX840c", "PowerEdge C4140", "DSS 8440", "PowerEdge XE2420", "PowerEdge XE7420", "PowerEdge XE7440", "Dell EMC Storage NX3240", "Dell EMC Storage NX3340", "Dell EMC XC Core 6420 System", "Dell EMC XC Core XC640 System", "Dell EMC XC Core XC740xd System", "Dell EMC XC Core XC740xd2", "Dell EMC XC Core XC940 System", "Dell EMC XC Core XCXR2" ], "product": "PowerEdge Platform", "vendor": "Dell", "versions": [ { "status": "affected", "version": "Versions prior to 2.18.1 " } ] } ], "datePublic": "2023-05-15T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell PowerEdge 14G server BIOS versions prior to 2.18.1 and Dell Precision BIOS versions prior to 2.18.2, contain an Out of Bounds write vulnerability. A local attacker with low privileges could potentially exploit this vulnerability leading to exposure of some SMRAM stack/data/code in System Management Mode, leading to arbitrary code execution or escalation of privilege.\u003c/span\u003e\n\n" } ], "value": "\nDell PowerEdge 14G server BIOS versions prior to 2.18.1 and Dell Precision BIOS versions prior to 2.18.2, contain an Out of Bounds write vulnerability. A local attacker with low privileges could potentially exploit this vulnerability leading to exposure of some SMRAM stack/data/code in System Management Mode, leading to arbitrary code execution or escalation of privilege.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787: Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-22T10:48:45.847Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000213550/dsa-2023-098-security-update-for-dell-poweredge-14g-server-bios-for-an-out-of-bounds-write-vulnerability" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2023-25537", "datePublished": "2023-05-22T10:48:45.847Z", "dateReserved": "2023-02-07T09:35:27.079Z", "dateUpdated": "2024-08-02T11:25:18.634Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34410
Vulnerability from cvelistv5
Published
2023-03-16 11:29
Modified
2024-08-03 09:07
Severity ?
EPSS score ?
Summary
Dell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Dell | PowerEdge Platform |
Version: 14G,15G |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:07:16.247Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000206296/dsa-2022-204-dell-poweredge-improper-smm-communication-buffer-verification-vulnerability" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerEdge Platform", "vendor": "Dell", "versions": [ { "status": "affected", "version": "14G,15G" } ] } ], "datePublic": "2022-12-15T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.\u003c/span\u003e\n\n" } ], "value": "\nDell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-16T11:29:24.037Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000206296/dsa-2022-204-dell-poweredge-improper-smm-communication-buffer-verification-vulnerability" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2022-34410", "datePublished": "2023-03-16T11:29:24.037Z", "dateReserved": "2022-06-23T18:55:17.105Z", "dateUpdated": "2024-08-03T09:07:16.247Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34413
Vulnerability from cvelistv5
Published
2023-03-16 11:35
Modified
2024-08-03 09:07
Severity ?
EPSS score ?
Summary
Dell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Dell | PowerEdge Platform |
Version: 14G,15G |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:07:16.142Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000206296/dsa-2022-204-dell-poweredge-improper-smm-communication-buffer-verification-vulnerability" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerEdge Platform", "vendor": "Dell", "versions": [ { "status": "affected", "version": "14G,15G" } ] } ], "datePublic": "2022-12-15T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.\u003c/span\u003e\n\n" } ], "value": "\nDell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-16T11:35:09.561Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000206296/dsa-2022-204-dell-poweredge-improper-smm-communication-buffer-verification-vulnerability" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2022-34413", "datePublished": "2023-03-16T11:35:09.561Z", "dateReserved": "2022-06-23T18:55:17.107Z", "dateUpdated": "2024-08-03T09:07:16.142Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34415
Vulnerability from cvelistv5
Published
2023-03-16 11:44
Modified
2024-08-03 09:07
Severity ?
EPSS score ?
Summary
Dell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Dell | PowerEdge Platform |
Version: 14G,15G |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:07:16.151Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000206296/dsa-2022-204-dell-poweredge-improper-smm-communication-buffer-verification-vulnerability" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerEdge Platform", "vendor": "Dell", "versions": [ { "status": "affected", "version": "14G,15G" } ] } ], "datePublic": "2022-12-15T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.\u003c/span\u003e\n\n" } ], "value": "\nDell PowerEdge BIOS and Dell Precision BIOS contain an Improper SMM communication buffer verification vulnerability. A local malicious user with high Privileges may potentially exploit this vulnerability to perform arbitrary code execution or cause denial of service.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-16T11:44:58.828Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000206296/dsa-2022-204-dell-poweredge-improper-smm-communication-buffer-verification-vulnerability" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2022-34415", "datePublished": "2023-03-16T11:44:58.828Z", "dateReserved": "2022-06-23T18:55:17.108Z", "dateUpdated": "2024-08-03T09:07:16.151Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }