DSA-2022-317: Dell Client Security Update for Dell Client BIOS
摘要: Dell Client Consumer platform remediation is available for this vulnerability that may be exploited by malicious users to compromise the affected systems.
本文章適用於
本文章不適用於
本文無關於任何特定產品。
本文未識別所有產品版本。
影響
Medium
詳細資料
| Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
| CVE-2022-34399 | Dell BIOS contains a buffer access vulnerability. A malicious user with administrator privileges may potentially exploit this vulnerability by sending input larger than expected in order to read certain sections. | 5.1 |
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N |
See the table below for Dell Client BIOS releases containing resolutions to these vulnerabilities. Dell Technologies recommends all customers update at the earliest opportunity.
Go to the Drivers & Downloads site for updates on the applicable products. To learn more, see Dell KB article 124211: Dell BIOS Updates, and download the update for your Dell computer.
Customers may use one of the Dell notification solutions to be notified and download driver, BIOS, and firmware updates automatically once available.
| Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
| CVE-2022-34399 | Dell BIOS contains a buffer access vulnerability. A malicious user with administrator privileges may potentially exploit this vulnerability by sending input larger than expected in order to read certain sections. | 5.1 |
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N |
See the table below for Dell Client BIOS releases containing resolutions to these vulnerabilities. Dell Technologies recommends all customers update at the earliest opportunity.
Go to the Drivers & Downloads site for updates on the applicable products. To learn more, see Dell KB article 124211: Dell BIOS Updates, and download the update for your Dell computer.
Customers may use one of the Dell notification solutions to be notified and download driver, BIOS, and firmware updates automatically once available.
受影響的產品與補救措施
| Product | BIOS Update Version | BIOS Release Date (MM-DD-YYYY) |
| Alienware m15 A6 | 1.4.3 | 09-29-2022 |
| Alienware m15 Ryzen Edition R5 | 1.8.0 | 10-26-2022 |
| Alienware m17 Ryzen Edition R5 | 1.4.3 | 09-29-2022 |
| Dell G15 5515 | 1.8.0 | 10-26-2022 |
| Dell G15 5525 | 1.4.3 | 09-29-2022 |
| Inspiron 3505 | 1.9.0 | 10-11-2022 |
| Inspiron 3515 | 1.9.0 | 10-11-2022 |
| Inspiron 3525 | 1.5.0 | 10-13-2022 |
| Inspiron 3585 | 1.10.0 | 10-26-2022 |
| Inspiron 3595 | 1.5.0 | 10-26-2022 |
| Inspiron 3785 | 1.10.0 | 10-26-2022 |
| Vostro 3405 | 1.9.0 | 10-11-2022 |
| Vostro 3425 | 1.5.0 | 10-13-2022 |
| Vostro 3515 | 1.9.0 | 10-11-2022 |
| Vostro 3525 | 1.5.0 | 10-13-2022 |
| Product | BIOS Update Version | BIOS Release Date (MM-DD-YYYY) |
| Alienware m15 A6 | 1.4.3 | 09-29-2022 |
| Alienware m15 Ryzen Edition R5 | 1.8.0 | 10-26-2022 |
| Alienware m17 Ryzen Edition R5 | 1.4.3 | 09-29-2022 |
| Dell G15 5515 | 1.8.0 | 10-26-2022 |
| Dell G15 5525 | 1.4.3 | 09-29-2022 |
| Inspiron 3505 | 1.9.0 | 10-11-2022 |
| Inspiron 3515 | 1.9.0 | 10-11-2022 |
| Inspiron 3525 | 1.5.0 | 10-13-2022 |
| Inspiron 3585 | 1.10.0 | 10-26-2022 |
| Inspiron 3595 | 1.5.0 | 10-26-2022 |
| Inspiron 3785 | 1.10.0 | 10-26-2022 |
| Vostro 3405 | 1.9.0 | 10-11-2022 |
| Vostro 3425 | 1.5.0 | 10-13-2022 |
| Vostro 3515 | 1.9.0 | 10-11-2022 |
| Vostro 3525 | 1.5.0 | 10-13-2022 |
修訂歷史記錄
| Revision | Date | Description |
| 1.0 | 2022-11-15 | Initial Release |
感謝
Dell Technologies thanks Cederic Laumen (@ling_sec) for reporting CVE-2022-34399.
相關資訊
法律免責聲明
受影響的產品
Alienware m15 Ryzen Edition R5, Dell G15 5515 Ryzen Edition, Dell G15 5525, Inspiron 3505, Inspiron 3585, Inspiron 3595, Inspiron 3785, Product Security Information, Vostro 3405產品
Vostro 3425, Vostro 3525文章屬性
文章編號: 000205329
文章類型: Dell Security Advisory
上次修改時間: 18 9月 2025
向其他 Dell 使用者尋求您問題的答案
支援服務
檢查您的裝置是否在支援服務的涵蓋範圍內。