DSA-2022-144: Dell Client Security Update for Dell Client BIOS

Resumen: Dell Client Consumer and Commercial platform remediation is available for these vulnerabilities that may exploited by locally authenticated malicious users to compromise the affected systems. ...

Este artículo se aplica a Este artículo no se aplica a Este artículo no está vinculado a ningún producto específico. No se identifican todas las versiones del producto en este artículo.

Impacto

High

Detalles

Proprietary Code CVEs Description CVSS Base Score CVSS Vector String
CVE-2022-31220 Dell BIOS versions contain an Unchecked Return Value vulnerability. A local authenticated administrator user may potentially exploit this vulnerability in order to change the state of the system or cause unexpected failures.
3.0

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:L This hyperlink is taking you to a website outside of Dell Technologies.
CVE-2022-31221 Dell BIOS versions contain an Information Exposure vulnerability. A local authenticated administrator user may potentially exploit this vulnerability in order access sensitive state information on the system. 2.3
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N This hyperlink is taking you to a website outside of Dell Technologies.
CVE-2022-31222 Dell BIOS versions contain a Missing Release of Resource after Effective Lifetime vulnerability. A local authenticated administrator user may potentially exploit this vulnerability by consuming excess memory in order to cause the application to crash. 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L This hyperlink is taking you to a website outside of Dell Technologies.
CVE-2022-31223 Dell BIOS versions contain an Improper Neutralization of Null Byte vulnerability. A local authenticated administrator user may potentially exploit this vulnerability by sending unexpected null bytes in order to read memory on the system. 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N This hyperlink is taking you to a website outside of Dell Technologies.
CVE-2022-31224 Dell BIOS versions contain an Improper Protection Against Voltage and Clock Glitches vulnerability. An attacker with physical access to the system may potentially exploit this vulnerability by triggering a fault condition in order to change the behavior of the system. 2.0 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N This hyperlink is taking you to a website outside of Dell Technologies.
CVE-2022-31225 Dell BIOS versions contain an Unchecked Return Value vulnerability. A local authenticated administrator user may potentially exploit this vulnerability in order to change the state of the system or cause unexpected failures. 3.0
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H This hyperlink is taking you to a website outside of Dell Technologies.
CVE-2022-31226 Dell BIOS versions contain a Stack-based Buffer Overflow vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by sending excess data to a function in order to gain arbitrary code execution on the system.
7.1
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:L This hyperlink is taking you to a website outside of Dell Technologies.


See the table below for Dell Client BIOS releases containing resolutions to these vulnerabilities. Dell recommends all customers update at the earliest opportunity.

Go to the Drivers & Downloads site for updates on the applicable products. To learn more, see Dell KB article Dell BIOS Updates, and download the update for your Dell computer.

Customers may use one of the Dell notification solutions to be notified and download driver, BIOS, and firmware updates automatically once available.
Proprietary Code CVEs Description CVSS Base Score CVSS Vector String
CVE-2022-31220 Dell BIOS versions contain an Unchecked Return Value vulnerability. A local authenticated administrator user may potentially exploit this vulnerability in order to change the state of the system or cause unexpected failures.
3.0

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:L This hyperlink is taking you to a website outside of Dell Technologies.
CVE-2022-31221 Dell BIOS versions contain an Information Exposure vulnerability. A local authenticated administrator user may potentially exploit this vulnerability in order access sensitive state information on the system. 2.3
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N This hyperlink is taking you to a website outside of Dell Technologies.
CVE-2022-31222 Dell BIOS versions contain a Missing Release of Resource after Effective Lifetime vulnerability. A local authenticated administrator user may potentially exploit this vulnerability by consuming excess memory in order to cause the application to crash. 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L This hyperlink is taking you to a website outside of Dell Technologies.
CVE-2022-31223 Dell BIOS versions contain an Improper Neutralization of Null Byte vulnerability. A local authenticated administrator user may potentially exploit this vulnerability by sending unexpected null bytes in order to read memory on the system. 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N This hyperlink is taking you to a website outside of Dell Technologies.
CVE-2022-31224 Dell BIOS versions contain an Improper Protection Against Voltage and Clock Glitches vulnerability. An attacker with physical access to the system may potentially exploit this vulnerability by triggering a fault condition in order to change the behavior of the system. 2.0 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N This hyperlink is taking you to a website outside of Dell Technologies.
CVE-2022-31225 Dell BIOS versions contain an Unchecked Return Value vulnerability. A local authenticated administrator user may potentially exploit this vulnerability in order to change the state of the system or cause unexpected failures. 3.0
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H This hyperlink is taking you to a website outside of Dell Technologies.
CVE-2022-31226 Dell BIOS versions contain a Stack-based Buffer Overflow vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by sending excess data to a function in order to gain arbitrary code execution on the system.
7.1
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:L This hyperlink is taking you to a website outside of Dell Technologies.


See the table below for Dell Client BIOS releases containing resolutions to these vulnerabilities. Dell recommends all customers update at the earliest opportunity.

Go to the Drivers & Downloads site for updates on the applicable products. To learn more, see Dell KB article Dell BIOS Updates, and download the update for your Dell computer.

Customers may use one of the Dell notification solutions to be notified and download driver, BIOS, and firmware updates automatically once available.
Dell Technologies recomienda que todos los clientes tengan en cuenta tanto la puntuación base como cualquier otra puntuación ambiental y temporal relevante que pueda afectar la posible gravedad asociada con la vulnerabilidad de seguridad en particular.

Corrección y productos afectados

The Affected Product versions include all supported versions before the BIOS Update Version listed in the table for each product.
 
Product BIOS Update Version BIOS Release Date (MM-DD-YYYY)
ChengMing 3900 1.1.66 06-27-2022
Inspiron 14 Plus 7420 1.2.0 06-03-2022
Inspiron 16 Plus 7620 1.2.0 06-03-2022
Inspiron 3910 1.1.66 06-27-2022
Inspiron 5320 1.1.0 04-21-2022
Inspiron 5420 1.4.1 06-15-2022
Inspiron 5620 1.4.1 06-15-2022
Inspiron 5620 1.4.1 06-15-2022
Inspiron 7420 1.3.0 07-07-2022
Inspiron 7620 1.3.0 07-07-2022
OptiPlex 3000 1.1.66 06-27-2022
OptiPlex 3000 Thin Client 1.0.7 06-06-2022
OptiPlex 5000 1.3.62 06-28-2022
OptiPlex 5400 1.0.13 06-22-2022
OptiPlex 7000 1.3.62 06-28-2022
OptiPlex 7000 OEM 1.3.62 06-24-2022
OptiPlex 7400 1.0.13 06-22-2022
Precision 3460 Small Form Factor 1.3.62 06-27-2022
Precision 3660 Tower 1.3.71 07-07-2022
Precision 5770 1.6.0 05-05-2022
Vostro 3710 1.1.66 06-27-2022
Vostro 3910 1.1.66 06-27-2022
Vostro 5320 1.1.0 04-21-2022
Vostro 5620 1.4.1 06-15-2022
Vostro 7620 1.2.0 06-03-2022
XPS 17 9720 1.6.0 05-05-2022
The Affected Product versions include all supported versions before the BIOS Update Version listed in the table for each product.
 
Product BIOS Update Version BIOS Release Date (MM-DD-YYYY)
ChengMing 3900 1.1.66 06-27-2022
Inspiron 14 Plus 7420 1.2.0 06-03-2022
Inspiron 16 Plus 7620 1.2.0 06-03-2022
Inspiron 3910 1.1.66 06-27-2022
Inspiron 5320 1.1.0 04-21-2022
Inspiron 5420 1.4.1 06-15-2022
Inspiron 5620 1.4.1 06-15-2022
Inspiron 5620 1.4.1 06-15-2022
Inspiron 7420 1.3.0 07-07-2022
Inspiron 7620 1.3.0 07-07-2022
OptiPlex 3000 1.1.66 06-27-2022
OptiPlex 3000 Thin Client 1.0.7 06-06-2022
OptiPlex 5000 1.3.62 06-28-2022
OptiPlex 5400 1.0.13 06-22-2022
OptiPlex 7000 1.3.62 06-28-2022
OptiPlex 7000 OEM 1.3.62 06-24-2022
OptiPlex 7400 1.0.13 06-22-2022
Precision 3460 Small Form Factor 1.3.62 06-27-2022
Precision 3660 Tower 1.3.71 07-07-2022
Precision 5770 1.6.0 05-05-2022
Vostro 3710 1.1.66 06-27-2022
Vostro 3910 1.1.66 06-27-2022
Vostro 5320 1.1.0 04-21-2022
Vostro 5620 1.4.1 06-15-2022
Vostro 7620 1.2.0 06-03-2022
XPS 17 9720 1.6.0 05-05-2022

Historial de revisiones

RevisionDateDescription
1.02022-08-05Initial Release

Información relacionada

Productos afectados

Inspiron 14 5420, Inspiron 14 7420 2-in-1, Inspiron 16 7620 2-in-1, Inspiron 16 Plus 7620, Inspiron 3910, OptiPlex 3000 Tower, OptiPlex 3000 Thin Client, Optiplex 5000 Tower, OptiPlex 5400 All-In-One, OptiPlex 7000 Tower, OptiPlex 7400 All-In-One , Precision 5770, Precision 3460 Small Form Factor, Precision 3660 Tower, Product Security Information, Vostro 5320, Vostro 5620, Vostro 7620, Vostro 3710, Vostro 3910, XPS 17 9720 ...
Propiedades del artículo
Número del artículo: 000202196
Tipo de artículo: Dell Security Advisory
Última modificación: 08 jun 2023
Encuentre respuestas a sus preguntas de otros usuarios de Dell
Servicios de soporte
Compruebe si el dispositivo está cubierto por los servicios de soporte.