DSA-2022-144: Dell Client Security Update for Dell Client BIOS
摘要: Dell Client Consumer and Commercial platform remediation is available for these vulnerabilities that may exploited by locally authenticated malicious users to compromise the affected systems. ...
本文章適用於
本文章不適用於
本文無關於任何特定產品。
本文未識別所有產品版本。
影響
High
詳細資料
| Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
| CVE-2022-31220 | Dell BIOS versions contain an Unchecked Return Value vulnerability. A local authenticated administrator user may potentially exploit this vulnerability in order to change the state of the system or cause unexpected failures. | 3.0 |
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:L |
| CVE-2022-31221 | Dell BIOS versions contain an Information Exposure vulnerability. A local authenticated administrator user may potentially exploit this vulnerability in order access sensitive state information on the system. | 2.3 | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N |
| CVE-2022-31222 | Dell BIOS versions contain a Missing Release of Resource after Effective Lifetime vulnerability. A local authenticated administrator user may potentially exploit this vulnerability by consuming excess memory in order to cause the application to crash. | 2.3 | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L |
| CVE-2022-31223 | Dell BIOS versions contain an Improper Neutralization of Null Byte vulnerability. A local authenticated administrator user may potentially exploit this vulnerability by sending unexpected null bytes in order to read memory on the system. | 2.3 | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N |
| CVE-2022-31224 | Dell BIOS versions contain an Improper Protection Against Voltage and Clock Glitches vulnerability. An attacker with physical access to the system may potentially exploit this vulnerability by triggering a fault condition in order to change the behavior of the system. | 2.0 | CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N |
| CVE-2022-31225 | Dell BIOS versions contain an Unchecked Return Value vulnerability. A local authenticated administrator user may potentially exploit this vulnerability in order to change the state of the system or cause unexpected failures. | 3.0 | CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H |
| CVE-2022-31226 | Dell BIOS versions contain a Stack-based Buffer Overflow vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by sending excess data to a function in order to gain arbitrary code execution on the system. | 7.1 |
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:L |
See the table below for Dell Client BIOS releases containing resolutions to these vulnerabilities. Dell recommends all customers update at the earliest opportunity.
Go to the Drivers & Downloads site for updates on the applicable products. To learn more, see Dell KB article Dell BIOS Updates, and download the update for your Dell computer.
Customers may use one of the Dell notification solutions to be notified and download driver, BIOS, and firmware updates automatically once available.
| Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
| CVE-2022-31220 | Dell BIOS versions contain an Unchecked Return Value vulnerability. A local authenticated administrator user may potentially exploit this vulnerability in order to change the state of the system or cause unexpected failures. | 3.0 |
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:L |
| CVE-2022-31221 | Dell BIOS versions contain an Information Exposure vulnerability. A local authenticated administrator user may potentially exploit this vulnerability in order access sensitive state information on the system. | 2.3 | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N |
| CVE-2022-31222 | Dell BIOS versions contain a Missing Release of Resource after Effective Lifetime vulnerability. A local authenticated administrator user may potentially exploit this vulnerability by consuming excess memory in order to cause the application to crash. | 2.3 | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L |
| CVE-2022-31223 | Dell BIOS versions contain an Improper Neutralization of Null Byte vulnerability. A local authenticated administrator user may potentially exploit this vulnerability by sending unexpected null bytes in order to read memory on the system. | 2.3 | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N |
| CVE-2022-31224 | Dell BIOS versions contain an Improper Protection Against Voltage and Clock Glitches vulnerability. An attacker with physical access to the system may potentially exploit this vulnerability by triggering a fault condition in order to change the behavior of the system. | 2.0 | CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N |
| CVE-2022-31225 | Dell BIOS versions contain an Unchecked Return Value vulnerability. A local authenticated administrator user may potentially exploit this vulnerability in order to change the state of the system or cause unexpected failures. | 3.0 | CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H |
| CVE-2022-31226 | Dell BIOS versions contain a Stack-based Buffer Overflow vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by sending excess data to a function in order to gain arbitrary code execution on the system. | 7.1 |
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:L |
See the table below for Dell Client BIOS releases containing resolutions to these vulnerabilities. Dell recommends all customers update at the earliest opportunity.
Go to the Drivers & Downloads site for updates on the applicable products. To learn more, see Dell KB article Dell BIOS Updates, and download the update for your Dell computer.
Customers may use one of the Dell notification solutions to be notified and download driver, BIOS, and firmware updates automatically once available.
受影響的產品與補救措施
The Affected Product versions include all supported versions before the BIOS Update Version listed in the table for each product.
| Product | BIOS Update Version | BIOS Release Date (MM-DD-YYYY) |
| ChengMing 3900 | 1.1.66 | 06-27-2022 |
| Inspiron 14 Plus 7420 | 1.2.0 | 06-03-2022 |
| Inspiron 16 Plus 7620 | 1.2.0 | 06-03-2022 |
| Inspiron 3910 | 1.1.66 | 06-27-2022 |
| Inspiron 5320 | 1.1.0 | 04-21-2022 |
| Inspiron 5420 | 1.4.1 | 06-15-2022 |
| Inspiron 5620 | 1.4.1 | 06-15-2022 |
| Inspiron 5620 | 1.4.1 | 06-15-2022 |
| Inspiron 7420 | 1.3.0 | 07-07-2022 |
| Inspiron 7620 | 1.3.0 | 07-07-2022 |
| OptiPlex 3000 | 1.1.66 | 06-27-2022 |
| OptiPlex 3000 Thin Client | 1.0.7 | 06-06-2022 |
| OptiPlex 5000 | 1.3.62 | 06-28-2022 |
| OptiPlex 5400 | 1.0.13 | 06-22-2022 |
| OptiPlex 7000 | 1.3.62 | 06-28-2022 |
| OptiPlex 7000 OEM | 1.3.62 | 06-24-2022 |
| OptiPlex 7400 | 1.0.13 | 06-22-2022 |
| Precision 3460 Small Form Factor | 1.3.62 | 06-27-2022 |
| Precision 3660 Tower | 1.3.71 | 07-07-2022 |
| Precision 5770 | 1.6.0 | 05-05-2022 |
| Vostro 3710 | 1.1.66 | 06-27-2022 |
| Vostro 3910 | 1.1.66 | 06-27-2022 |
| Vostro 5320 | 1.1.0 | 04-21-2022 |
| Vostro 5620 | 1.4.1 | 06-15-2022 |
| Vostro 7620 | 1.2.0 | 06-03-2022 |
| XPS 17 9720 | 1.6.0 | 05-05-2022 |
The Affected Product versions include all supported versions before the BIOS Update Version listed in the table for each product.
| Product | BIOS Update Version | BIOS Release Date (MM-DD-YYYY) |
| ChengMing 3900 | 1.1.66 | 06-27-2022 |
| Inspiron 14 Plus 7420 | 1.2.0 | 06-03-2022 |
| Inspiron 16 Plus 7620 | 1.2.0 | 06-03-2022 |
| Inspiron 3910 | 1.1.66 | 06-27-2022 |
| Inspiron 5320 | 1.1.0 | 04-21-2022 |
| Inspiron 5420 | 1.4.1 | 06-15-2022 |
| Inspiron 5620 | 1.4.1 | 06-15-2022 |
| Inspiron 5620 | 1.4.1 | 06-15-2022 |
| Inspiron 7420 | 1.3.0 | 07-07-2022 |
| Inspiron 7620 | 1.3.0 | 07-07-2022 |
| OptiPlex 3000 | 1.1.66 | 06-27-2022 |
| OptiPlex 3000 Thin Client | 1.0.7 | 06-06-2022 |
| OptiPlex 5000 | 1.3.62 | 06-28-2022 |
| OptiPlex 5400 | 1.0.13 | 06-22-2022 |
| OptiPlex 7000 | 1.3.62 | 06-28-2022 |
| OptiPlex 7000 OEM | 1.3.62 | 06-24-2022 |
| OptiPlex 7400 | 1.0.13 | 06-22-2022 |
| Precision 3460 Small Form Factor | 1.3.62 | 06-27-2022 |
| Precision 3660 Tower | 1.3.71 | 07-07-2022 |
| Precision 5770 | 1.6.0 | 05-05-2022 |
| Vostro 3710 | 1.1.66 | 06-27-2022 |
| Vostro 3910 | 1.1.66 | 06-27-2022 |
| Vostro 5320 | 1.1.0 | 04-21-2022 |
| Vostro 5620 | 1.4.1 | 06-15-2022 |
| Vostro 7620 | 1.2.0 | 06-03-2022 |
| XPS 17 9720 | 1.6.0 | 05-05-2022 |
修訂歷史記錄
| Revision | Date | Description |
| 1.0 | 2022-08-05 | Initial Release |
相關資訊
法律免責聲明
受影響的產品
Inspiron 14 5420, Inspiron 14 7420 2-in-1, Inspiron 16 7620 2-in-1, Inspiron 16 Plus 7620, Inspiron 3910, OptiPlex 3000 Tower, OptiPlex 3000 Thin Client, Optiplex 5000 Tower, OptiPlex 5400 All-In-One, OptiPlex 7000 Tower, OptiPlex 7400 All-In-One
, Precision 5770, Precision 3460 Small Form Factor, Precision 3660 Tower, Product Security Information, Vostro 5320, Vostro 5620, Vostro 7620, Vostro 3710, Vostro 3910, XPS 17 9720
...
文章屬性
文章編號: 000202196
文章類型: Dell Security Advisory
上次修改時間: 08 6月 2023
向其他 Dell 使用者尋求您問題的答案
支援服務
檢查您的裝置是否在支援服務的涵蓋範圍內。