DSA-2022-144: Dell Client Security Update for Dell Client BIOS

Riepilogo: Dell Client Consumer and Commercial platform remediation is available for these vulnerabilities that may exploited by locally authenticated malicious users to compromise the affected systems. ...

Questo articolo si applica a Questo articolo non si applica a Questo articolo non è legato a un prodotto specifico. Non tutte le versioni del prodotto sono identificate in questo articolo.

Impatto

High

Dettagli

Proprietary Code CVEs Description CVSS Base Score CVSS Vector String
CVE-2022-31220 Dell BIOS versions contain an Unchecked Return Value vulnerability. A local authenticated administrator user may potentially exploit this vulnerability in order to change the state of the system or cause unexpected failures.
3.0

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:L This hyperlink is taking you to a website outside of Dell Technologies.
CVE-2022-31221 Dell BIOS versions contain an Information Exposure vulnerability. A local authenticated administrator user may potentially exploit this vulnerability in order access sensitive state information on the system. 2.3
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N This hyperlink is taking you to a website outside of Dell Technologies.
CVE-2022-31222 Dell BIOS versions contain a Missing Release of Resource after Effective Lifetime vulnerability. A local authenticated administrator user may potentially exploit this vulnerability by consuming excess memory in order to cause the application to crash. 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L This hyperlink is taking you to a website outside of Dell Technologies.
CVE-2022-31223 Dell BIOS versions contain an Improper Neutralization of Null Byte vulnerability. A local authenticated administrator user may potentially exploit this vulnerability by sending unexpected null bytes in order to read memory on the system. 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N This hyperlink is taking you to a website outside of Dell Technologies.
CVE-2022-31224 Dell BIOS versions contain an Improper Protection Against Voltage and Clock Glitches vulnerability. An attacker with physical access to the system may potentially exploit this vulnerability by triggering a fault condition in order to change the behavior of the system. 2.0 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N This hyperlink is taking you to a website outside of Dell Technologies.
CVE-2022-31225 Dell BIOS versions contain an Unchecked Return Value vulnerability. A local authenticated administrator user may potentially exploit this vulnerability in order to change the state of the system or cause unexpected failures. 3.0
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H This hyperlink is taking you to a website outside of Dell Technologies.
CVE-2022-31226 Dell BIOS versions contain a Stack-based Buffer Overflow vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by sending excess data to a function in order to gain arbitrary code execution on the system.
7.1
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:L This hyperlink is taking you to a website outside of Dell Technologies.


See the table below for Dell Client BIOS releases containing resolutions to these vulnerabilities. Dell recommends all customers update at the earliest opportunity.

Go to the Drivers & Downloads site for updates on the applicable products. To learn more, see Dell KB article Dell BIOS Updates, and download the update for your Dell computer.

Customers may use one of the Dell notification solutions to be notified and download driver, BIOS, and firmware updates automatically once available.
Proprietary Code CVEs Description CVSS Base Score CVSS Vector String
CVE-2022-31220 Dell BIOS versions contain an Unchecked Return Value vulnerability. A local authenticated administrator user may potentially exploit this vulnerability in order to change the state of the system or cause unexpected failures.
3.0

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:L This hyperlink is taking you to a website outside of Dell Technologies.
CVE-2022-31221 Dell BIOS versions contain an Information Exposure vulnerability. A local authenticated administrator user may potentially exploit this vulnerability in order access sensitive state information on the system. 2.3
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N This hyperlink is taking you to a website outside of Dell Technologies.
CVE-2022-31222 Dell BIOS versions contain a Missing Release of Resource after Effective Lifetime vulnerability. A local authenticated administrator user may potentially exploit this vulnerability by consuming excess memory in order to cause the application to crash. 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L This hyperlink is taking you to a website outside of Dell Technologies.
CVE-2022-31223 Dell BIOS versions contain an Improper Neutralization of Null Byte vulnerability. A local authenticated administrator user may potentially exploit this vulnerability by sending unexpected null bytes in order to read memory on the system. 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N This hyperlink is taking you to a website outside of Dell Technologies.
CVE-2022-31224 Dell BIOS versions contain an Improper Protection Against Voltage and Clock Glitches vulnerability. An attacker with physical access to the system may potentially exploit this vulnerability by triggering a fault condition in order to change the behavior of the system. 2.0 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N This hyperlink is taking you to a website outside of Dell Technologies.
CVE-2022-31225 Dell BIOS versions contain an Unchecked Return Value vulnerability. A local authenticated administrator user may potentially exploit this vulnerability in order to change the state of the system or cause unexpected failures. 3.0
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H This hyperlink is taking you to a website outside of Dell Technologies.
CVE-2022-31226 Dell BIOS versions contain a Stack-based Buffer Overflow vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by sending excess data to a function in order to gain arbitrary code execution on the system.
7.1
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:L This hyperlink is taking you to a website outside of Dell Technologies.


See the table below for Dell Client BIOS releases containing resolutions to these vulnerabilities. Dell recommends all customers update at the earliest opportunity.

Go to the Drivers & Downloads site for updates on the applicable products. To learn more, see Dell KB article Dell BIOS Updates, and download the update for your Dell computer.

Customers may use one of the Dell notification solutions to be notified and download driver, BIOS, and firmware updates automatically once available.
Dell Technologies raccomanda a tutti i clienti di prendere in considerazione sia il punteggio base CVSS, sia ogni eventuale punteggio temporale o ambientale che possa avere effetti sul livello di gravità potenziale associato a una specifica vulnerabilità di sicurezza.

Prodotti interessati e correzione

The Affected Product versions include all supported versions before the BIOS Update Version listed in the table for each product.
 
Product BIOS Update Version BIOS Release Date (MM-DD-YYYY)
ChengMing 3900 1.1.66 06-27-2022
Inspiron 14 Plus 7420 1.2.0 06-03-2022
Inspiron 16 Plus 7620 1.2.0 06-03-2022
Inspiron 3910 1.1.66 06-27-2022
Inspiron 5320 1.1.0 04-21-2022
Inspiron 5420 1.4.1 06-15-2022
Inspiron 5620 1.4.1 06-15-2022
Inspiron 5620 1.4.1 06-15-2022
Inspiron 7420 1.3.0 07-07-2022
Inspiron 7620 1.3.0 07-07-2022
OptiPlex 3000 1.1.66 06-27-2022
OptiPlex 3000 Thin Client 1.0.7 06-06-2022
OptiPlex 5000 1.3.62 06-28-2022
OptiPlex 5400 1.0.13 06-22-2022
OptiPlex 7000 1.3.62 06-28-2022
OptiPlex 7000 OEM 1.3.62 06-24-2022
OptiPlex 7400 1.0.13 06-22-2022
Precision 3460 Small Form Factor 1.3.62 06-27-2022
Precision 3660 Tower 1.3.71 07-07-2022
Precision 5770 1.6.0 05-05-2022
Vostro 3710 1.1.66 06-27-2022
Vostro 3910 1.1.66 06-27-2022
Vostro 5320 1.1.0 04-21-2022
Vostro 5620 1.4.1 06-15-2022
Vostro 7620 1.2.0 06-03-2022
XPS 17 9720 1.6.0 05-05-2022
The Affected Product versions include all supported versions before the BIOS Update Version listed in the table for each product.
 
Product BIOS Update Version BIOS Release Date (MM-DD-YYYY)
ChengMing 3900 1.1.66 06-27-2022
Inspiron 14 Plus 7420 1.2.0 06-03-2022
Inspiron 16 Plus 7620 1.2.0 06-03-2022
Inspiron 3910 1.1.66 06-27-2022
Inspiron 5320 1.1.0 04-21-2022
Inspiron 5420 1.4.1 06-15-2022
Inspiron 5620 1.4.1 06-15-2022
Inspiron 5620 1.4.1 06-15-2022
Inspiron 7420 1.3.0 07-07-2022
Inspiron 7620 1.3.0 07-07-2022
OptiPlex 3000 1.1.66 06-27-2022
OptiPlex 3000 Thin Client 1.0.7 06-06-2022
OptiPlex 5000 1.3.62 06-28-2022
OptiPlex 5400 1.0.13 06-22-2022
OptiPlex 7000 1.3.62 06-28-2022
OptiPlex 7000 OEM 1.3.62 06-24-2022
OptiPlex 7400 1.0.13 06-22-2022
Precision 3460 Small Form Factor 1.3.62 06-27-2022
Precision 3660 Tower 1.3.71 07-07-2022
Precision 5770 1.6.0 05-05-2022
Vostro 3710 1.1.66 06-27-2022
Vostro 3910 1.1.66 06-27-2022
Vostro 5320 1.1.0 04-21-2022
Vostro 5620 1.4.1 06-15-2022
Vostro 7620 1.2.0 06-03-2022
XPS 17 9720 1.6.0 05-05-2022

Cronologia delle revisioni

RevisionDateDescription
1.02022-08-05Initial Release

Informazioni correlate

Prodotti interessati

Inspiron 14 5420, Inspiron 14 7420 2-in-1, Inspiron 16 7620 2-in-1, Inspiron 16 Plus 7620, Inspiron 3910, OptiPlex 3000 Tower, OptiPlex 3000 Thin Client, Optiplex 5000 Tower, OptiPlex 5400 All-In-One, OptiPlex 7000 Tower, OptiPlex 7400 All-In-One , Precision 5770, Precision 3460 Small Form Factor, Precision 3660 Tower, Product Security Information, Vostro 5320, Vostro 5620, Vostro 7620, Vostro 3710, Vostro 3910, XPS 17 9720 ...
Proprietà dell'articolo
Numero articolo: 000202196
Tipo di articolo: Dell Security Advisory
Ultima modifica: 08 giu 2023
Trova risposta alle tue domande dagli altri utenti Dell
Support Services
Verifica che il dispositivo sia coperto dai Servizi di supporto.