Vulnerabilites related to dell - latitude_e5410
cve-2015-2890
Vulnerability from cvelistv5
Published
2015-08-01 01:00
Modified
2024-08-06 05:32
Severity ?
EPSS score ?
Summary
The BIOS implementation on Dell Latitude, OptiPlex, Precision Mobile Workstation, and Precision Workstation Client Solutions (CS) devices with model-dependent firmware before A21 does not enforce a BIOS_CNTL locking protection mechanism upon being woken from sleep, which allows local users to conduct EFI flash attacks by leveraging console access, a similar issue to CVE-2015-3692.
References
▼ | URL | Tags |
---|---|---|
http://www.kb.cert.org/vuls/id/577140 | third-party-advisory, x_refsource_CERT-VN | |
http://www.kb.cert.org/vuls/id/BLUU-9XXQ9L | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T05:32:20.350Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "VU#577140", tags: [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred", ], url: "http://www.kb.cert.org/vuls/id/577140", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.kb.cert.org/vuls/id/BLUU-9XXQ9L", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-07-30T00:00:00", descriptions: [ { lang: "en", value: "The BIOS implementation on Dell Latitude, OptiPlex, Precision Mobile Workstation, and Precision Workstation Client Solutions (CS) devices with model-dependent firmware before A21 does not enforce a BIOS_CNTL locking protection mechanism upon being woken from sleep, which allows local users to conduct EFI flash attacks by leveraging console access, a similar issue to CVE-2015-3692.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2015-08-01T01:57:02", orgId: "37e5125f-f79b-445b-8fad-9564f167944b", shortName: "certcc", }, references: [ { name: "VU#577140", tags: [ "third-party-advisory", "x_refsource_CERT-VN", ], url: "http://www.kb.cert.org/vuls/id/577140", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.kb.cert.org/vuls/id/BLUU-9XXQ9L", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cert@cert.org", ID: "CVE-2015-2890", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The BIOS implementation on Dell Latitude, OptiPlex, Precision Mobile Workstation, and Precision Workstation Client Solutions (CS) devices with model-dependent firmware before A21 does not enforce a BIOS_CNTL locking protection mechanism upon being woken from sleep, which allows local users to conduct EFI flash attacks by leveraging console access, a similar issue to CVE-2015-3692.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "VU#577140", refsource: "CERT-VN", url: "http://www.kb.cert.org/vuls/id/577140", }, { name: "http://www.kb.cert.org/vuls/id/BLUU-9XXQ9L", refsource: "CONFIRM", url: "http://www.kb.cert.org/vuls/id/BLUU-9XXQ9L", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "37e5125f-f79b-445b-8fad-9564f167944b", assignerShortName: "certcc", cveId: "CVE-2015-2890", datePublished: "2015-08-01T01:00:00", dateReserved: "2015-04-03T00:00:00", dateUpdated: "2024-08-06T05:32:20.350Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Vulnerability from fkie_nvd
Published
2015-08-01 01:59
Modified
2024-11-21 02:28
Severity ?
Summary
The BIOS implementation on Dell Latitude, OptiPlex, Precision Mobile Workstation, and Precision Workstation Client Solutions (CS) devices with model-dependent firmware before A21 does not enforce a BIOS_CNTL locking protection mechanism upon being woken from sleep, which allows local users to conduct EFI flash attacks by leveraging console access, a similar issue to CVE-2015-3692.
References
▼ | URL | Tags | |
---|---|---|---|
cret@cert.org | http://www.kb.cert.org/vuls/id/577140 | Third Party Advisory, US Government Resource | |
cret@cert.org | http://www.kb.cert.org/vuls/id/BLUU-9XXQ9L | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/577140 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/BLUU-9XXQ9L | Third Party Advisory, US Government Resource |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
dell | bios | * | |
dell | latitude_e6420_atg | * | |
dell | latitude_e6420_xfr | * | |
dell | bios | * | |
dell | latitude_e6220 | * | |
dell | latitude_xt3 | * | |
dell | bios | * | |
dell | latitude_e4310 | * | |
dell | latitude_e5410 | * | |
dell | latitude_e5510 | * | |
dell | latitude_e6410_atg | * | |
dell | latitude_e6510 | * | |
dell | precision_mobile_m4600 | * | |
dell | precision_t1600 | * | |
dell | bios | * | |
dell | latitude_e6320 | * | |
dell | latitude_e6520 | * | |
dell | bios | * | |
dell | precision_mobile_m4500 | * | |
dell | precision_mobile_m6600 | * | |
dell | bios | a13 | |
dell | latitude_e4310 | * | |
dell | latitude_e5420 | * | |
dell | latitude_e5520 | * | |
dell | bios | * | |
dell | precision_t3600 | * | |
dell | precision_t5600 | * | |
dell | precision_t5600_xl | * | |
dell | bios | * | |
dell | optiplex_390 | * | |
dell | bios | * | |
dell | optiplex_790 | * | |
dell | optiplex_990 | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:dell:bios:*:*:*:*:*:*:*:*", matchCriteriaId: "F96D27AD-EB5B-487E-8235-F05956F183BA", versionEndIncluding: "a20", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:dell:latitude_e6420_atg:*:*:*:*:*:*:*:*", matchCriteriaId: "DCC5428F-8648-430F-8CE8-08C772D5BDED", vulnerable: false, }, { criteria: "cpe:2.3:h:dell:latitude_e6420_xfr:*:*:*:*:*:*:*:*", matchCriteriaId: "9C74F0B2-05AF-49EE-B076-D6DEFDBE41CB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:dell:bios:*:*:*:*:*:*:*:*", matchCriteriaId: "8392EFC5-B9AB-452E-9AD6-8B32A635481C", versionEndIncluding: "a12", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:dell:latitude_e6220:*:*:*:*:*:*:*:*", matchCriteriaId: "2B3FE1C2-B072-436E-96CB-22D23BDCE8C0", vulnerable: false, }, { criteria: "cpe:2.3:h:dell:latitude_xt3:*:*:*:*:*:*:*:*", matchCriteriaId: "39513230-B59E-49F7-88A3-F445D03EA27B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:dell:bios:*:*:*:*:*:*:*:*", matchCriteriaId: "502A1AD4-229B-4FE7-931D-10742D113F5A", versionEndIncluding: "a15", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:dell:latitude_e4310:*:*:*:*:*:*:*:*", matchCriteriaId: "7E89E008-BD0E-437D-9B9B-CF7DD9203AE3", vulnerable: false, }, { criteria: "cpe:2.3:h:dell:latitude_e5410:*:*:*:*:*:*:*:*", matchCriteriaId: "78DF7412-FAD0-4E61-B30F-85E2A566795A", vulnerable: false, }, { criteria: "cpe:2.3:h:dell:latitude_e5510:*:*:*:*:*:*:*:*", matchCriteriaId: "953DF818-61F0-4ED4-9666-722C798205D3", vulnerable: false, }, { criteria: "cpe:2.3:h:dell:latitude_e6410_atg:*:*:*:*:*:*:*:*", matchCriteriaId: "77B33C69-A368-454F-A052-2B46F3CECF7F", vulnerable: false, }, { criteria: "cpe:2.3:h:dell:latitude_e6510:*:*:*:*:*:*:*:*", matchCriteriaId: "FF3067E4-E9F1-46A8-A9B3-E0A8F488A9EC", vulnerable: false, }, { criteria: "cpe:2.3:h:dell:precision_mobile_m4600:*:*:*:*:*:*:*:*", matchCriteriaId: "A11853A7-601B-4E8F-8582-8958A59D8AB9", vulnerable: false, }, { criteria: "cpe:2.3:h:dell:precision_t1600:*:*:*:*:*:*:*:*", matchCriteriaId: "AFC18C0F-E3EC-48F3-B990-DB4ACEABB6A4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:dell:bios:*:*:*:*:*:*:*:*", matchCriteriaId: "C66608F6-FA56-453C-BBCD-DFF64BB8C95E", versionEndIncluding: "a18", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:dell:latitude_e6320:*:*:*:*:*:*:*:*", matchCriteriaId: "810B5BA9-8DB3-4A62-8CD5-AC1FBA4298FC", vulnerable: false, }, { criteria: "cpe:2.3:h:dell:latitude_e6520:*:*:*:*:*:*:*:*", matchCriteriaId: "3107B874-0B9D-4243-9194-2F2E7DEFBFD0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:dell:bios:*:*:*:*:*:*:*:*", matchCriteriaId: "1E7904EB-673A-4DD1-A73E-CED4A1B13CDF", versionEndIncluding: "a14", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:dell:precision_mobile_m4500:*:*:*:*:*:*:*:*", matchCriteriaId: "D124B8F0-156B-46C2-933B-2E1CF3F15871", vulnerable: false, }, { criteria: "cpe:2.3:h:dell:precision_mobile_m6600:*:*:*:*:*:*:*:*", matchCriteriaId: "C03D4B2E-FB0E-45E8-8DBE-A3B578C8B3D8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:dell:bios:a13:*:*:*:*:*:*:*", matchCriteriaId: "4EA431FC-1121-4246-A4BD-1347F6D2C293", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:dell:latitude_e4310:*:*:*:*:*:*:*:*", matchCriteriaId: "7E89E008-BD0E-437D-9B9B-CF7DD9203AE3", vulnerable: false, }, { criteria: "cpe:2.3:h:dell:latitude_e5420:*:*:*:*:*:*:*:*", matchCriteriaId: "7B7A9D4F-814C-4D09-95FF-C35D5B9DD2C5", vulnerable: false, }, { criteria: "cpe:2.3:h:dell:latitude_e5520:*:*:*:*:*:*:*:*", matchCriteriaId: "0D8FA4C7-80B6-49EA-9FCF-504ACFAB0EBB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:dell:bios:*:*:*:*:*:*:*:*", matchCriteriaId: "A69BD5BB-CEE8-4DB4-B7CE-20B6373FBB3B", versionEndIncluding: "a11", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:dell:precision_t3600:*:*:*:*:*:*:*:*", matchCriteriaId: "E605E0D0-2320-44FE-97A7-39FD8D9D88C0", vulnerable: false, }, { criteria: "cpe:2.3:h:dell:precision_t5600:*:*:*:*:*:*:*:*", matchCriteriaId: "22E90D88-3C7D-4C6A-BBA0-1F7AE623EB85", vulnerable: false, }, { criteria: "cpe:2.3:h:dell:precision_t5600_xl:*:*:*:*:*:*:*:*", matchCriteriaId: "23652CE5-3B58-4067-94E0-334D987A87A1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:dell:bios:*:*:*:*:*:*:*:*", matchCriteriaId: "9B0C2091-2FB9-49CD-8B38-840BEAD78109", versionEndIncluding: "a10", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:dell:optiplex_390:*:*:*:*:*:*:*:*", matchCriteriaId: "A8E08E38-3D9D-4E1E-8CEB-0160D768BF41", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:dell:bios:*:*:*:*:*:*:*:*", matchCriteriaId: "DE8947B0-DA10-4A54-B03D-C2AE3D917732", versionEndIncluding: "a17", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:dell:optiplex_790:*:*:*:*:*:*:*:*", matchCriteriaId: "935B84EB-4EE8-4A44-83CE-FFEA1A480ACA", vulnerable: false, }, { criteria: "cpe:2.3:h:dell:optiplex_990:*:*:*:*:*:*:*:*", matchCriteriaId: "C30A4609-2EE6-4AB5-BE64-1D03029EC547", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "The BIOS implementation on Dell Latitude, OptiPlex, Precision Mobile Workstation, and Precision Workstation Client Solutions (CS) devices with model-dependent firmware before A21 does not enforce a BIOS_CNTL locking protection mechanism upon being woken from sleep, which allows local users to conduct EFI flash attacks by leveraging console access, a similar issue to CVE-2015-3692.", }, { lang: "es", value: "Vulnerabilidad en la implementación de la BIOS en dispositivos Dell Latitude, OptiPlex, Precisision Mobile Workstation y Precision Workstation Client Solutions (CS) con modelo dependiente del firmware anterior a A21, no impone un mecanismo de protección de bloqueo BIOS_CNTL al ser despertado de la suspensión, lo que permite a usuarios locales conducir ataques de flash EFI mediante el aprovechamiento de acceso a la consola, un problema similar a CVE-2015-3692.", }, ], id: "CVE-2015-2890", lastModified: "2024-11-21T02:28:16.517", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, exploitabilityScore: 0.8, impactScore: 5.2, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2015-08-01T01:59:13.943", references: [ { source: "cret@cert.org", tags: [ "Third Party Advisory", "US Government Resource", ], url: "http://www.kb.cert.org/vuls/id/577140", }, { source: "cret@cert.org", tags: [ "Third Party Advisory", "US Government Resource", ], url: "http://www.kb.cert.org/vuls/id/BLUU-9XXQ9L", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "US Government Resource", ], url: "http://www.kb.cert.org/vuls/id/577140", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "US Government Resource", ], url: "http://www.kb.cert.org/vuls/id/BLUU-9XXQ9L", }, ], sourceIdentifier: "cret@cert.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }