Action not permitted
Modal body text goes here.
Modal Title
Modal Body
WID-SEC-W-2025-0388
Vulnerability from csaf_certbund - Published: 2025-02-17 23:00 - Updated: 2025-02-17 23:00Summary
Dell BIOS (Client Platform): Schwachstelle ermöglicht Privilegieneskalation
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Das BIOS ist die Firmware bei IBM PC kompatiblen Computern.
Angriff
Ein lokaler Angreifer kann eine Schwachstelle in Dell BIOS ausnutzen, um seine Privilegien zu erhöhen.
Betroffene Betriebssysteme
- BIOS/Firmware
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Das BIOS ist die Firmware bei IBM PC kompatiblen Computern.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann eine Schwachstelle in Dell BIOS ausnutzen, um seine Privilegien zu erh\u00f6hen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- BIOS/Firmware",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-0388 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0388.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-0388 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0388"
},
{
"category": "external",
"summary": "Dell Security Advisory vom 2025-02-17",
"url": "https://www.dell.com/support/kbdoc/de-de/000258429/dsa-2025-021"
}
],
"source_lang": "en-US",
"title": "Dell BIOS (Client Platform): Schwachstelle erm\u00f6glicht Privilegieneskalation",
"tracking": {
"current_release_date": "2025-02-17T23:00:00.000+00:00",
"generator": {
"date": "2025-02-18T09:05:38.940+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.12"
}
},
"id": "WID-SEC-W-2025-0388",
"initial_release_date": "2025-02-17T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-02-17T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Dell BIOS",
"product": {
"name": "Dell BIOS",
"product_id": "T041253",
"product_identification_helper": {
"cpe": "cpe:/h:dell:bios:-"
}
}
}
],
"category": "vendor",
"name": "Dell"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-52541",
"product_status": {
"known_affected": [
"T041253"
]
},
"release_date": "2025-02-17T23:00:00.000+00:00",
"title": "CVE-2024-52541"
}
]
}
CVE-2024-52541 (GCVE-0-2024-52541)
Vulnerability from cvelistv5 – Published: 2025-02-19 16:46 – Updated: 2025-02-19 17:08
VLAI?
EPSS
Summary
Dell Client Platform BIOS contains a Weak Authentication vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.
Severity ?
8.2 (High)
CWE
- CWE-1390 - Weak Authentication
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dell | Dell Client Platform BIOS |
Affected:
N/A , < 1.34.0
(semver)
Affected: N/A , < 1.28.0 (semver) Affected: N/A , < 1.21.0 (semver) Affected: N/A , < 1.8.0 (semver) Affected: N/A , < 1.9.0 (semver) Affected: N/A , < 1.17.0 (semver) Affected: N/A , < 1.7.0 (semver) Affected: N/A , < 1.26.0 (semver) Affected: N/A , < 1.20.0 (semver) Affected: N/A , < 1.31.1 (semver) Affected: N/A , < 1.30.0 (semver) Affected: N/A , < 1.29.0 (semver) Affected: N/A , < 1.32.0 (semver) Affected: N/A , < 1.21.1 (semver) Affected: N/A , < 1.25.1 (semver) Affected: N/A , < 1.33.0 (semver) Affected: N/A , < 1.31.0 (semver) Affected: N/A , < 2.31.0 (semver) Affected: N/A , < 2.39.0 (semver) Affected: N/A , < 2.43.0 (semver) Affected: N/A , < 1.27.0 (semver) Affected: N/A , < 1.22.0 (semver) Affected: N/A , < 1.18.0 (semver) Affected: N/A , < 2.30.0 (semver) Affected: N/A , < 1.24.0 (semver) Affected: N/A , < 1.25.0 (semver) Affected: N/A , < 1.10.0 (semver) Affected: N/A , < 1.14.0 (semver) Affected: N/A , < 1.6.1 (semver) Affected: N/A , < 1.15.1 (semver) Affected: N/A , < 1.36.1 (semver) Affected: N/A , < 1.33.1 (semver) Affected: N/A , < 1.48.0 (semver) Affected: N/A , < 1.37.0 (semver) Affected: N/A , < 1.27.1 (semver) Affected: N/A , < 1.26.1 (semver) Affected: N/A , < 1.16.0 (semver) Affected: N/A , < 1.35.1 (semver) Affected: N/A , < 1.32.1 (semver) Affected: N/A , < 1.38.0 (semver) Affected: N/A , < 1.40.0 (semver) Affected: N/A , < 1.35.0 (semver) Affected: N/A , < 1.36.0 (semver) Affected: N/A , < 1.41.0 (semver) Affected: N/A , < 1.31.2 (semver) Affected: N/A , < 1.18.1 (semver) Affected: N/A , < 1.39.0 (semver) Affected: N/A , < 1.53.0 (semver) Affected: N/A , < 1.19.1 (semver) Affected: N/A , < 1.38.1 (semver) Affected: N/A , < 1.7.1 (semver) Affected: N/A , < 1.8.1 (semver) Affected: N/A , < 1.23.0 (semver) Affected: N/A , < 1.34.1 (semver) Affected: N/A , < 1.23.2 (semver) Affected: N/A , < 1.30.1 (semver) Affected: N/A , < 2.28.1 (semver) Affected: N/A , < 2.22.1 (semver) Affected: N/A , < 1.28.1 (semver) Affected: N/A , < 1.1.44 (semver) Affected: N/A , < 3.10.0 (semver) Affected: N/A , < 1.6.0 (semver) Affected: N/A , < 2.33.0 (semver) Affected: N/A , < 2.20.0 (semver) Affected: N/A , < 2.34.0 (semver) Affected: N/A , < 1.15.0 (semver) Affected: N/A , < 1.34.8 (semver) Affected: N/A , < 1.9.1 (semver) Affected: N/A , < 2.6.1 (semver) Affected: N/A , < 01.11.02 (semver) Affected: N/A , < 2.31.1 (semver) Affected: N/A , < 3.27.1 (semver) Affected: N/A , < 2.29.1 (semver) Affected: N/A , < 2.18.1 (semver) Affected: N/A , < 1.13.0 (semver) Affected: N/A , < 1.11.0 (semver) Affected: N/A , < 1.11.1 (semver) Affected: N/A , < 2.24.1 (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-52541",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-19T17:07:39.827843Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-02-19T17:08:48.094Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"modules": [
"Alienware m15 R6",
"Alienware m15 R7",
"Alienware m16 R1",
"Alienware m16 R2",
"Alienware M18 R2",
"Alienware x14 R2",
"Alienware X16 R2",
"ChengMing 3900",
"ChengMing 3910/3911",
"ChengMing 3990",
"Dell Edge Gateway 5000",
"Dell G15 5510",
"Dell G15 5511",
"Dell G15 5530",
"Dell G5 5000",
"Dell Precision 3430 Tower",
"Dell Precision 3431 Tower",
"Dell Precision 3630 Tower",
"Dell Precision 5820 Tower",
"Dell Precision 7820 Tower",
"Embedded Box PC 5000",
"Inspiron 13 5320",
"Inspiron 13 5330",
"Inspiron 14\u00a0 5410/5418",
"Inspiron 14 5420",
"Inspiron 14 Plus 7420",
"Inspiron 14 Plus 7440",
"Inspiron 15 3530",
"Inspiron 16 5640",
"Inspiron 24 5420 All-in-One",
"Inspiron 5301",
"Inspiron 5400/5401",
"Latitude 12 Rugged Extreme 7214",
"Latitude 3190",
"Latitude 3310",
"Latitude 3310 2-In-1",
"Latitude 3340",
"Latitude 3400",
"Latitude 3410",
"Latitude 3420",
"Latitude 5320",
"Latitude 5400",
"Latitude 5401",
"Latitude 5420",
"Latitude 5430 Rugged Laptop",
"Latitude 5440",
"Latitude 5480",
"Latitude 7212 Rugged Extreme Tablet",
"Latitude 7230 Rugged Extreme",
"Latitude 7320",
"Latitude 7350 Detachable",
"Latitude 7450",
"Latitude 9330",
"Latitude 9420",
"OptiPlex 3000 Thin Client",
"OptiPlex 3070",
"OptiPlex 3080",
"OptiPlex 3090",
"OptiPlex 5080",
"OptiPlex 5400 All-In-One",
"Precision 3260 XE Compact / Precision 3260 Compact",
"Precision 3280 CFF",
"Precision 3420 Tower",
"Precision 3660",
"Precision 3930 Rack",
"Precision 5480",
"Precision 5530 2-In-1",
"Precision 5690",
"Precision 5860 Tower",
"Precision 7875 Tower",
"Vostro 3681",
"XPS 13 9310",
"XPS 13 9310 2-in-1",
"XPS 13 Plus 9320",
"XPS 13 9340",
"XPS 14 9440",
"XPS 16 9640",
"XPS 8940"
],
"product": "Dell Client Platform BIOS",
"vendor": "Dell",
"versions": [
{
"lessThan": "1.34.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.28.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.21.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.8.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.9.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.17.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.7.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.26.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.20.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.30.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.29.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.32.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.21.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.25.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.33.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.31.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.39.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.43.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.27.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.22.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.18.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.30.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.24.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.25.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.10.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.14.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.6.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.15.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.36.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.33.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.48.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.37.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.27.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.26.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.16.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.35.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.32.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.38.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.40.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.35.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.36.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.41.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.31.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.18.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.39.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.53.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.19.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.38.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.7.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.8.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.23.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.34.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.23.2",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.30.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.28.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.22.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.28.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.1.44",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "3.10.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.6.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.33.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.20.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.34.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.15.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.34.8",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.9.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.6.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "01.11.02",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.31.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "3.27.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.29.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.18.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.13.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.11.0",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "1.11.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
},
{
"lessThan": "2.24.1",
"status": "affected",
"version": "N/A",
"versionType": "semver"
}
]
}
],
"datePublic": "2025-02-17T06:30:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dell Client Platform BIOS contains a Weak Authentication vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.\u003cbr\u003e"
}
],
"value": "Dell Client Platform BIOS contains a Weak Authentication vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-1390",
"description": "CWE-1390: Weak Authentication",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-02-19T16:46:22.803Z",
"orgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"shortName": "dell"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://www.dell.com/support/kbdoc/en-us/000258429/dsa-2025-021"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "c550e75a-17ff-4988-97f0-544cde3820fe",
"assignerShortName": "dell",
"cveId": "CVE-2024-52541",
"datePublished": "2025-02-19T16:46:22.803Z",
"dateReserved": "2024-11-12T06:04:07.776Z",
"dateUpdated": "2025-02-19T17:08:48.094Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…