DSA-2019-174: Dell Client XPS 13 2-in-1 (7390) Configuration Vulnerability

Yhteenveto: Dell Client XPS 13 2-in-1 (7390) BIOS requires an update to address a configuration vulnerability.

Tämä artikkeli koskee tuotetta Tämä artikkeli ei koske tuotetta Tämä artikkeli ei liity tiettyyn tuotteeseen. Tässä artikkelissa ei yksilöidä kaikkia tuoteversioita.

Vaikutus

High

Tiedot

Settings for the Dell XPS 13 2-in-1 (7390) BIOS versions prior to 1.1.3 contain a configuration vulnerability. The BIOS configuration for the "Enable Thunderbolt (and PCIe behind TBT) pre-boot modules" setting is enabled by default. A local unauthenticated attacker with physical access to a user’s system can obtain read or write access to main memory via a DMA attack during platform boot.

Settings for the Dell XPS 13 2-in-1 (7390) BIOS versions prior to 1.1.3 contain a configuration vulnerability. The BIOS configuration for the "Enable Thunderbolt (and PCIe behind TBT) pre-boot modules" setting is enabled by default. A local unauthenticated attacker with physical access to a user’s system can obtain read or write access to main memory via a DMA attack during platform boot.

Dell Technologies suosittelee, että kaikki asiakkaat ottavat huomioon sekä CVSS-peruspistemäärän että kaikki asiaankuuluvat väliaikaiset ja ympäristöön liittyvät pisteet, jotka voivat vaikuttaa tietyn tietoturvahaavoittuvuuden mahdolliseen vakavuuteen.

Tuotteet, joihin asia vaikuttaa, ja tilanteen korjaaminen

Affected products:

Dell XPS 13 2-in-1 (7390) BIOS versions prior to 1.1.3

Resolution:

Refer to the table below for the Dell Client BIOS release containing a resolution to this vulnerability.

After applying the update, the default BIOS settings need to be applied for the change to take effect. To learn more, visit the Dell Knowledge Base article How to restore the BIOS (System Setup) defaults on a Dell Product.

Please visit the Drivers and Downloads site for updates on the applicable products. To learn more, visit the Dell Knowledge Base article Dell BIOS Updates, and download the update for your Dell computer.

Customers may use one of the Dell notification solutions to be notified and download driver, BIOS and firmware updates automatically once available.

Product

Update BIOS Version
(or greater)

Release Date (MM/DD/YYYY)
Expected Release ( Month /YYYY)

XPS 13 2-in-1 (7390)

1.1.3

12/05/2019

Affected products:

Dell XPS 13 2-in-1 (7390) BIOS versions prior to 1.1.3

Resolution:

Refer to the table below for the Dell Client BIOS release containing a resolution to this vulnerability.

After applying the update, the default BIOS settings need to be applied for the change to take effect. To learn more, visit the Dell Knowledge Base article How to restore the BIOS (System Setup) defaults on a Dell Product.

Please visit the Drivers and Downloads site for updates on the applicable products. To learn more, visit the Dell Knowledge Base article Dell BIOS Updates, and download the update for your Dell computer.

Customers may use one of the Dell notification solutions to be notified and download driver, BIOS and firmware updates automatically once available.

Product

Update BIOS Version
(or greater)

Release Date (MM/DD/YYYY)
Expected Release ( Month /YYYY)

XPS 13 2-in-1 (7390)

1.1.3

12/05/2019

Kiitokset

Dell would like to thank Mickey Shkatov from Eclypsium for reporting this vulnerability.

Asiaan liittyvät tiedot

Tuotteet, joihin vaikutus kohdistuu

XPS 13 7390 2-in-1
Artikkelin ominaisuudet
Artikkelin numero: 000134602
Artikkelin tyyppi: Dell Security Advisory
Viimeksi muutettu: 18 elok. 2025
Etsi vastauksia kysymyksiisi muilta Dell-käyttäjiltä
Tukipalvelut
Tarkista, kuuluuko laitteesi tukipalveluiden piiriin.