CVE-2024-32858
Vulnerability from cvelistv5
Published
2024-06-13 12:48
Modified
2024-08-02 02:20
Severity ?
EPSS score ?
Summary
Dell Client Platform BIOS contains an Improper Input Validation vulnerability in an externally developed component. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Code execution.
References
▼ | URL | Tags | |
---|---|---|---|
security_alert@emc.com | https://www.dell.com/support/kbdoc/en-us/000223439/dsa-2024-124 | Vendor Advisory |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:dell:alienware_aurora_r10_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "alienware_aurora_r10_firmware", "vendor": "dell", "versions": [ { "lessThan": "2.8.0", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "cpes": [ "cpe:2.3:o:dell:alienware_aurora_r11_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "alienware_aurora_r11_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.0.24", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "cpes": [ "cpe:2.3:o:dell:alienware_aurora_r12_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "alienware_aurora_r12_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.1.25", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "cpes": [ "cpe:2.3:o:dell:alienware_aurora_r13_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "alienware_aurora_r13_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.19.0", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "cpes": [ "cpe:2.3:o:dell:alienware_aurora_r14_ryzen_edition_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "alienware_aurora_r14_ryzen_edition_firmware", "vendor": "dell", "versions": [ { "lessThan": "2.18.0", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "cpes": [ "cpe:2.3:o:dell:alienware_aurora_r15_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "alienware_aurora_r15_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.12.0", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "cpes": [ "cpe:2.3:o:dell:alienware_aurora_r15_amd_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "alienware_aurora_r15_amd_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.13.0", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "cpes": [ "cpe:2.3:o:dell:alienware_aurora_r16_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "alienware_aurora_r16_firmware", "vendor": "dell", "versions": [ { "lessThan": "2.7.0", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "cpes": [ "cpe:2.3:o:dell:inspiron_3502_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "inspiron_3502_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.16.0", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "cpes": [ "cpe:2.3:o:dell:xps_8950_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "xps_8950_firmware", "vendor": "dell", "versions": [ { "lessThan": "1.19.0", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "cpes": [ "cpe:2.3:o:dell:xps_8960_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "xps_8960_firmware", "vendor": "dell", "versions": [ { "lessThan": "2.6.0", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-32858", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-06-13T13:37:43.257078Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-13T16:09:43.292Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:20:35.666Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.dell.com/support/kbdoc/en-us/000223439/dsa-2024-124" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "CPG BIOS", "vendor": "Dell", "versions": [ { "lessThan": "2.8.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.0.24", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.1.25", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.19.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.12.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.13.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "2.18.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "2.7.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "1.16.0", "status": "affected", "version": "N/A", "versionType": "semver" }, { "lessThan": "2.6.0", "status": "affected", "version": "N/A", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Dell Technologies would like to thank Eason for reporting this issue" } ], "datePublic": "2024-06-11T06:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Dell Client Platform BIOS contains an Improper Input Validation vulnerability in an externally developed component. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Code execution." } ], "value": "Dell Client Platform BIOS contains an Improper Input Validation vulnerability in an externally developed component. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Code execution." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-13T12:48:29.724Z", "orgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "shortName": "dell" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.dell.com/support/kbdoc/en-us/000223439/dsa-2024-124" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe", "assignerShortName": "dell", "cveId": "CVE-2024-32858", "datePublished": "2024-06-13T12:48:29.724Z", "dateReserved": "2024-04-19T09:34:13.527Z", "dateUpdated": "2024-08-02T02:20:35.666Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-32858\",\"sourceIdentifier\":\"security_alert@emc.com\",\"published\":\"2024-06-13T13:15:48.833\",\"lastModified\":\"2024-09-24T17:45:28.353\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Dell Client Platform BIOS contains an Improper Input Validation vulnerability in an externally developed component. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Code execution.\"},{\"lang\":\"es\",\"value\":\"Dell Client Platform BIOS contiene una vulnerabilidad de validaci\u00f3n de entrada incorrecta en un componente desarrollado externamente. Un atacante con privilegios elevados y acceso local podr\u00eda explotar esta vulnerabilidad y provocar la ejecuci\u00f3n del c\u00f3digo.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":8.2,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":1.5,\"impactScore\":6.0},{\"source\":\"security_alert@emc.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":6.0}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]},{\"source\":\"security_alert@emc.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dell:xps_8960_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.6.0\",\"matchCriteriaId\":\"4C42BB7D-2380-4FA9-8C5C-FE0F594B3A7F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:xps_8960:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E75E14FE-EDC4-43F8-960C-F135EDFFBDCB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dell:xps_8950_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.19.0\",\"matchCriteriaId\":\"54398C42-AD80-4365-8F44-F3B6F44D33F5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:xps_8950:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5944D668-16F9-4098-A99E-811F02C65B2A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dell:inspiron_3502_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.16.0\",\"matchCriteriaId\":\"36119F09-7608-4DD7-A5BC-297D015F9FE8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:inspiron_3502:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52628A84-FEE1-4194-A13F-4139A3A0AE9F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dell:inspiron_15_3521_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.14.0\",\"matchCriteriaId\":\"2DFD29BF-F445-4A9B-9D50-827FE7587218\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:inspiron_15_3521:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70AC0D33-2C41-4EA7-969B-A5B3519330AA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dell:inspiron_15_3510_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.19.0\",\"matchCriteriaId\":\"2CB354C9-725F-41D3-A514-C61D1E2C6DD9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:inspiron_15_3510:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9B4D72F-BF7F-4AE3-825E-394DF12F0482\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dell:aurora_r16_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.7.0\",\"matchCriteriaId\":\"F084A15D-0C77-4AC7-A2E8-CCE5B638C968\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:aurora_r16:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6A86161-7209-4DC6-9315-66C37C1807DA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dell:alienware_x17_r2_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.20.0\",\"matchCriteriaId\":\"07378EE2-F446-4E05-A6C3-42532865C664\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_x17_r2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C0272BD-DAFD-47EC-9B70-F72B686032B8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dell:alienware_x17_r1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.22.0\",\"matchCriteriaId\":\"E83B0E30-CFFB-4AFE-AF42-1475F14186E7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_x17_r1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8128EE9B-97C5-40A2-A7F6-8AE7E4D9D1E1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dell:alienware_x15_r2_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.20.0\",\"matchCriteriaId\":\"D9A38198-F80D-4D7C-B660-8B5B44C95751\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_x15_r2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A254E353-E519-401F-8657-76C7625F9A0C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dell:alienware_x15_r1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.22.0\",\"matchCriteriaId\":\"002D9A38-2618-4896-B0BA-AC18CAF41253\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_x15_r1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5BC0BF5-9D20-43DB-BF65-F2D2E8EC6970\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dell:alienware_x14_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.18.0\",\"matchCriteriaId\":\"9F1AD900-16EC-4315-83A6-A2CB22E6E185\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_x14:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05928944-E647-4A4D-AEA1-B67804BC7DB5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dell:alienware_m17_r4_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.21.0\",\"matchCriteriaId\":\"B2380D6A-4E39-423D-9565-E8406AF99E86\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_m17_r4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C631E678-90F0-4DB2-8AB8-7378EC32FAC0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dell:alienware_m17_r3_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.27.0\",\"matchCriteriaId\":\"626441E2-E195-4E18-B5CF-093CE2706827\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_m17_r3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF7B8EAD-E6FD-4CCE-9CE8-605A3BF3357A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dell:alienware_m15_r4_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.21.0\",\"matchCriteriaId\":\"32A341BF-9651-47F1-8CE4-8AF991AD8CEF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_m15_r4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B084185F-1C0D-47D9-9F72-A79095462428\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dell:alienware_m15_r3_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.27.0\",\"matchCriteriaId\":\"CBC6538F-95F5-411B-9AEE-E330D33F765E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_m15_r3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCCE762E-FB6C-4493-A21F-347DE5CB57E0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dell:alienware_aurora_ryzen_edition_r14_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.18.0\",\"matchCriteriaId\":\"2C2FE0D4-FEFE-4E9D-BFCA-5EAC643E47A1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_aurora_ryzen_edition_r14:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66B64687-CF02-414E-B961-84A011DC49E6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dell:alienware_aurora_r15_amd_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.13.0\",\"matchCriteriaId\":\"34DF7BEA-2EF9-47A8-965D-C045C793F834\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_aurora_r15_amd:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"503027CC-7D9B-4F00-9728-48C12B18BD7B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dell:alienware_aurora_r15_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.12.0\",\"matchCriteriaId\":\"AB53C84B-F912-4BBF-B7B1-D2361E4B6E1A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_aurora_r15:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2943649A-0559-4184-AE43-B6FCEDF3BF98\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dell:alienware_aurora_r13_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.19.0\",\"matchCriteriaId\":\"DF07E3CF-0029-429F-84CA-C50CEF591176\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_aurora_r13:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"486DCCF7-79D9-45C1-8CBD-26FB78705F91\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dell:alienware_aurora_r12_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.1.25\",\"matchCriteriaId\":\"6D3892D1-FA31-4E08-8C4A-B233A7E6166E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_aurora_r12:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F0C34FD-6A6D-43BF-B548-13D57532AF8C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dell:alienware_aurora_r11_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.24\",\"matchCriteriaId\":\"09B0F2CD-223E-4C11-896E-E0D2AED3D7CA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_aurora_r11:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C32F25E-2F1F-409D-85DF-15CCAB423DD5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dell:alienware_aurora_r10_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.8.0\",\"matchCriteriaId\":\"C1C7E4EF-A5CE-479F-8FBC-A79920726D51\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_aurora_r10:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1B5E1A2-3F3B-42AF-93ED-01ABF2763BC6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:dell:alienware_area_51m_r2_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.26.0\",\"matchCriteriaId\":\"6D3E1671-D766-4BEE-A382-3F9950540382\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:dell:alienware_area_51m_r2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D355D92F-71AB-4D6D-9D3D-85A0BF4133E5\"}]}]}],\"references\":[{\"url\":\"https://www.dell.com/support/kbdoc/en-us/000223439/dsa-2024-124\",\"source\":\"security_alert@emc.com\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.