All the vulnerabilites related to dell - latitude_7220
cve-2020-5363
Vulnerability from cvelistv5
Published
2020-06-10 20:40
Modified
2024-09-16 20:53
Severity ?
EPSS score ?
Summary
Select Dell Client Consumer and Commercial platforms include an issue that allows the BIOS Admin password to be changed through Dell's manageability interface without knowledge of the current BIOS Admin password. This could potentially allow an unauthorized actor, with physical access and/or OS administrator privileges to the device, to gain privileged access to the platform and the hard drive.
References
▼ | URL | Tags |
---|---|---|
https://www.dell.com/support/article/SLN321604 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Dell | Dell Client Consumer and Commercial platforms |
Version: https://www.dell.com/support/article/SLN321604 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T08:30:23.893Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.dell.com/support/article/SLN321604" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Dell Client Consumer and Commercial platforms", "vendor": "Dell", "versions": [ { "status": "affected", "version": "https://www.dell.com/support/article/SLN321604" } ] } ], "datePublic": "2020-06-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Select Dell Client Consumer and Commercial platforms include an issue that allows the BIOS Admin password to be changed through Dell\u0027s manageability interface without knowledge of the current BIOS Admin password. This could potentially allow an unauthorized actor, with physical access and/or OS administrator privileges to the device, to gain privileged access to the platform and the hard drive." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-158", "description": "CWE-158: Improper Neutralization of Null Byte or NUL Character", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-10T20:40:13", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.dell.com/support/article/SLN321604" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@dell.com", "DATE_PUBLIC": "2020-06-02", "ID": "CVE-2020-5363", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Dell Client Consumer and Commercial platforms", "version": { "version_data": [ { "version_affected": "=", "version_value": "https://www.dell.com/support/article/SLN321604" } ] } } ] }, "vendor_name": "Dell" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Select Dell Client Consumer and Commercial platforms include an issue that allows the BIOS Admin password to be changed through Dell\u0027s manageability interface without knowledge of the current BIOS Admin password. This could potentially allow an unauthorized actor, with physical access and/or OS administrator privileges to the device, to gain privileged access to the platform and the hard drive." } ] }, "impact": { "cvss": { "baseScore": 8.6, "baseSeverity": "High", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-158: Improper Neutralization of Null Byte or NUL Character" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.dell.com/support/article/SLN321604", "refsource": "MISC", "url": "https://www.dell.com/support/article/SLN321604" } ] } } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2020-5363", "datePublished": "2020-06-10T20:40:13.376982Z", "dateReserved": "2020-01-03T00:00:00", "dateUpdated": "2024-09-16T20:53:09.058Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2020-06-10 21:15
Modified
2024-11-21 05:34
Severity ?
8.6 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
Select Dell Client Consumer and Commercial platforms include an issue that allows the BIOS Admin password to be changed through Dell's manageability interface without knowledge of the current BIOS Admin password. This could potentially allow an unauthorized actor, with physical access and/or OS administrator privileges to the device, to gain privileged access to the platform and the hard drive.
References
▼ | URL | Tags | |
---|---|---|---|
security_alert@emc.com | https://www.dell.com/support/article/SLN321604 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.dell.com/support/article/SLN321604 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:latitude_5300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "472B8BF6-CBEA-4D13-A9BF-B7F2CCBDFBEB", "versionEndExcluding": "1.9.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:latitude_5300:-:*:*:*:*:*:*:*", "matchCriteriaId": "01DB6216-3CF6-46C5-9592-4BACCF04130A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:latitude_5300_2-in-1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "80D11457-8720-47F5-887E-DCF20B007CC6", "versionEndExcluding": "1.9.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:latitude_5300_2-in-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "184C0853-8EE9-4CDE-94E1-A1CA0CA0518D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:latitude_5400_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "95FF8996-E107-4234-AEB6-DB160B238BE8", "versionEndExcluding": "1.7.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:latitude_5400:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA6BB99C-65CE-43D8-8034-F9844285747E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:latitude_5401_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "84C57FE0-9438-45B0-B989-C7D6E4E3B86C", "versionEndExcluding": "1.8.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:latitude_5401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7B6DD44-0D01-4737-A01A-FD5AA95D9809", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:latitude_5500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A06017E8-13B7-4A15-9888-F2746EDF9E11", "versionEndExcluding": "1.7.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:latitude_5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5EDBEF3-D117-4F6C-8373-FC744D327128", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:latitude_5501_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "59D4443F-654A-4139-B31A-1A40306B03C2", "versionEndExcluding": "1.8.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:latitude_5501:-:*:*:*:*:*:*:*", "matchCriteriaId": "18ED69A2-0B53-4B77-B65C-D6E291F17165", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:latitude_7200_2_in_1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5752689D-696E-42BF-8121-9BC0A4E813C9", "versionEndExcluding": "1.8.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:latitude_7200_2_in_1:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5D6DECA-23D7-4FE4-ADFC-0181F1A7DB38", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:latitude_7220_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0BCA7A82-95F7-4FF7-9165-080890712A72", "versionEndExcluding": "1.6.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:latitude_7220:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C07F7C8-8F9B-4C32-858A-7535C3EE69B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:latitude_7220ex_rugged_extreme_tablet_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "58C86C3A-7F53-4B4B-9A1D-5756EB2900A4", "versionEndExcluding": "1.6.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:latitude_7220ex_rugged_extreme_tablet:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABED319D-9A24-4768-BF6E-80ABB116B73A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:latitude_7300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A980EEE3-C20E-40D5-A356-72C6903BCAD5", "versionEndExcluding": "1.7.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:latitude_7300:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DE30AD4-D03C-441A-A42F-9A488B5B86B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:latitude_7400_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "11DDA62A-1FBC-44C7-8E9F-40F07F44BAD4", "versionEndExcluding": "1.7.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:latitude_7400:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF84D171-D235-4705-9F4E-84189DB64798", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:precision_3540_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1286833-199E-4976-A1EE-80018AC68FE4", "versionEndExcluding": "1.7.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:precision_3540:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6E64C4D-04A7-448C-A87D-66CC8F74B4BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:precision_3541_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ED2A4F8F-07AE-46DE-BDF0-F3D955995650", "versionEndExcluding": "1.8.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:precision_3541:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA67FEED-A4C5-41E2-B523-E7BD2A0DA19E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:precision_7540_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6402F353-8C7D-4399-A6B2-17E09CD66124", "versionEndExcluding": "1.9.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:precision_7540:-:*:*:*:*:*:*:*", "matchCriteriaId": "3400683A-24F0-494E-89CC-782769F0A643", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:precision_7740_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C15DC961-5B38-4587-BE72-BDFD96128A2D", "versionEndExcluding": "1.9.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:precision_7740:-:*:*:*:*:*:*:*", "matchCriteriaId": "91E8171B-5C5A-4019-A68F-AE8A3C2E0608", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:xps_13_9300_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E5E7B65E-7699-490C-A8E2-44E479B5C1CA", "versionEndExcluding": "1.0.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:xps_13_9300:-:*:*:*:*:*:*:*", "matchCriteriaId": "01156707-85B0-4580-92DB-4158658C9C6B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:xps_7390_2-in-1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9E640379-B1A5-4625-ACFD-833113E663D3", "versionEndExcluding": "1.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:xps_7390_2-in-1:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A78B3BC-8FEE-4AC4-B5C8-D29BD16AA944", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dell:xps_7590_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8BAB1362-F142-481C-B0C5-6B8F716F9BA8", "versionEndExcluding": "1.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dell:xps_7590:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9F5E46E-1839-4FCA-88EF-A06208973C1A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Select Dell Client Consumer and Commercial platforms include an issue that allows the BIOS Admin password to be changed through Dell\u0027s manageability interface without knowledge of the current BIOS Admin password. This could potentially allow an unauthorized actor, with physical access and/or OS administrator privileges to the device, to gain privileged access to the platform and the hard drive." }, { "lang": "es", "value": "Plataformas Select Dell Client Consumer and Commercial, incluyen un problema que permite cambiar la contrase\u00f1a de administrador de BIOS por medio de la interfaz de administraci\u00f3n de Dell sin conocer la contrase\u00f1a de administrador de BIOS actual. Potencialmente, esto podr\u00eda permitir a un actor no autorizado, con acceso f\u00edsico y/o privilegios de administrador del sistema operativo al dispositivo, obtener acceso privilegiado a la plataforma y al disco duro" } ], "id": "CVE-2020-5363", "lastModified": "2024-11-21T05:34:00.153", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 6.0, "source": "security_alert@emc.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-10T21:15:11.037", "references": [ { "source": "security_alert@emc.com", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/article/SLN321604" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.dell.com/support/article/SLN321604" } ], "sourceIdentifier": "security_alert@emc.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-158" } ], "source": "security_alert@emc.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }