DSA-2020-119: Dell Client Products Unauthorized BIOS Password Reset Tool Vulnerability
Summary: Dell Client Consumer and Commercial platforms contain remediation for a BIOS Password Recovery Mechanism vulnerability that could be exploited by malicious users to compromise the affected systems. ...
Αυτό το άρθρο ισχύει για
Αυτό το άρθρο δεν ισχύει για
Αυτό το άρθρο δεν συνδέεται με κάποιο συγκεκριμένο προϊόν.
Δεν προσδιορίζονται όλες οι εκδόσεις προϊόντων σε αυτό το άρθρο.
Impact
Medium
Details
| Proprietary Code CVE | Description | CVSS Base Score | CVSS Vector String |
|---|---|---|---|
| CVE-2020-5361 | Select Dell Client Commercial and Consumer platforms support a BIOS password reset capability that is designed to assist authorized customers who forget their passwords. Dell is aware of unauthorized password generation tools that can generate BIOS recovery passwords. The tools, which are not authorized by Dell, can be used by a physically present attacker to reset BIOS passwords and BIOS-managed Hard Disk Drive (HDD) passwords. An unauthenticated attacker with physical access to the system could potentially exploit this vulnerability to bypass security restrictions for BIOS Setup configuration, HDD access and BIOS pre-boot authentication. | 5.1 | CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L |
| Proprietary Code CVE | Description | CVSS Base Score | CVSS Vector String |
|---|---|---|---|
| CVE-2020-5361 | Select Dell Client Commercial and Consumer platforms support a BIOS password reset capability that is designed to assist authorized customers who forget their passwords. Dell is aware of unauthorized password generation tools that can generate BIOS recovery passwords. The tools, which are not authorized by Dell, can be used by a physically present attacker to reset BIOS passwords and BIOS-managed Hard Disk Drive (HDD) passwords. An unauthenticated attacker with physical access to the system could potentially exploit this vulnerability to bypass security restrictions for BIOS Setup configuration, HDD access and BIOS pre-boot authentication. | 5.1 | CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L |
Επηρεαζόμενα προϊόντα και αποκατάσταση
NOTE: See Additional Info
NOTE: See Additional Info
NOTE: Customers can choose to enable the Master Password Lockout feature from BIOS Setup (available on commercial platforms – all platforms with Insyde BIOS release from March 2024 onwards and for all other platforms starting from 2011) to protect BIOS Admin, BIOS System and HDD passwords from being reset. Dell also recommends customers follow security best practices and prevent unauthorized physical access to devices
NOTE: For enabling Master Password Lockout feature from BIOS Setup for Insyde BIOS-based platforms, upgrade to the latest BIOS release from March 2024 onwards. Please refer to Dell Client Products Unauthorized BIOS Password Reset Tools for more details on how to check if your system is running on Insyde BIOS.
WARNING: If the Master Password Lockout option is selected and the customer subsequently forgets the password, Dell will not be able to assist in the recovery of passwords. The platform will be unrecoverable, and the motherboard or hard drive will need to be replaced.
More information and answers to frequently asked questions can be viewed at: Dell Client Products Unauthorized BIOS Password Reset Tools
Dell Client Consumer and Commercial Platforms Affected
This issue affects select Dell Client Commercial and Consumer systems. This includes all platforms with Insyde BIOS and any platform that displays the following identifiers on the BIOS pre-boot password prompts (Dell Security Manager) are impacted.
More information and answers to frequently asked questions can be viewed at: Dell Client Products Unauthorized BIOS Password Reset Tools
Dell Client Consumer and Commercial Platforms Affected
This issue affects select Dell Client Commercial and Consumer systems. This includes all platforms with Insyde BIOS and any platform that displays the following identifiers on the BIOS pre-boot password prompts (Dell Security Manager) are impacted.
- <SERVICE TAG or HDD SN>-D35B
- <SERVICE TAG or HDD SN>-1F5A
- <SERVICE TAG or HDD SN>-595B
- <SERVICE TAG or HDD SN>-2A7B
- <SERVICE TAG or HDD SN>-1D3B
- <SERVICE TAG or HDD SN>-1F66
- <SERVICE TAG or HDD SN>-6FF1
- <SERVICE TAG or HDD SN>-BF97
- <SERVICE TAG or HDD SN>-E7A8
Revision History
| Revision | Date | Description |
|---|---|---|
| 1.0 | 2020-12-17 | Initial Release |
| 2.0 | 2023-11-29 | Updated Additional Info Section: Dell Client and Commercial Platforms Affected |
| 3.0 | 2024-04-02 | Updated Affected Products and Remediation Section: Dell Client Consumer and Commercial Platforms Affected |
| 4.0 | 2024-04-02 | Updated for enhanced presentation with no changes to content |
| 5.0 | 2024-04-02 | Updated for enhanced presentation with no changes to content |
| 6.0 | 2024-04-24 | Updated for enhanced presentation with no changes to content |
Related Information
Νομική αποποίηση ευθύνης
Επηρεαζόμενα προϊόντα
Product Security InformationΙδιότητες άρθρου
Article Number: 000180741
Article Type: Dell Security Advisory
Τελευταία τροποποίηση: 02 Απρ 2024
Βρείτε απαντήσεις στις ερωτήσεις σας από άλλους χρήστες της Dell
Υπηρεσίες υποστήριξης
Ελέγξτε αν η συσκευή σας καλύπτεται από τις Υπηρεσίες υποστήριξης.