DSA-2022-144: Dell Client Security Update for Dell Client BIOS
Summary: Dell Client Consumer and Commercial platform remediation is available for these vulnerabilities that may exploited by locally authenticated malicious users to compromise the affected systems. ...
This article applies to
This article does not apply to
This article is not tied to any specific product.
Not all product versions are identified in this article.
Impact
High
Details
| Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
| CVE-2022-31220 | Dell BIOS versions contain an Unchecked Return Value vulnerability. A local authenticated administrator user may potentially exploit this vulnerability in order to change the state of the system or cause unexpected failures. | 3.0 |
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:L |
| CVE-2022-31221 | Dell BIOS versions contain an Information Exposure vulnerability. A local authenticated administrator user may potentially exploit this vulnerability in order access sensitive state information on the system. | 2.3 | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N |
| CVE-2022-31222 | Dell BIOS versions contain a Missing Release of Resource after Effective Lifetime vulnerability. A local authenticated administrator user may potentially exploit this vulnerability by consuming excess memory in order to cause the application to crash. | 2.3 | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L |
| CVE-2022-31223 | Dell BIOS versions contain an Improper Neutralization of Null Byte vulnerability. A local authenticated administrator user may potentially exploit this vulnerability by sending unexpected null bytes in order to read memory on the system. | 2.3 | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N |
| CVE-2022-31224 | Dell BIOS versions contain an Improper Protection Against Voltage and Clock Glitches vulnerability. An attacker with physical access to the system may potentially exploit this vulnerability by triggering a fault condition in order to change the behavior of the system. | 2.0 | CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N |
| CVE-2022-31225 | Dell BIOS versions contain an Unchecked Return Value vulnerability. A local authenticated administrator user may potentially exploit this vulnerability in order to change the state of the system or cause unexpected failures. | 3.0 | CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H |
| CVE-2022-31226 | Dell BIOS versions contain a Stack-based Buffer Overflow vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by sending excess data to a function in order to gain arbitrary code execution on the system. | 7.1 |
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:L |
See the table below for Dell Client BIOS releases containing resolutions to these vulnerabilities. Dell recommends all customers update at the earliest opportunity.
Go to the Drivers & Downloads site for updates on the applicable products. To learn more, see Dell KB article Dell BIOS Updates, and download the update for your Dell computer.
Customers may use one of the Dell notification solutions to be notified and download driver, BIOS, and firmware updates automatically once available.
| Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
| CVE-2022-31220 | Dell BIOS versions contain an Unchecked Return Value vulnerability. A local authenticated administrator user may potentially exploit this vulnerability in order to change the state of the system or cause unexpected failures. | 3.0 |
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:L |
| CVE-2022-31221 | Dell BIOS versions contain an Information Exposure vulnerability. A local authenticated administrator user may potentially exploit this vulnerability in order access sensitive state information on the system. | 2.3 | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N |
| CVE-2022-31222 | Dell BIOS versions contain a Missing Release of Resource after Effective Lifetime vulnerability. A local authenticated administrator user may potentially exploit this vulnerability by consuming excess memory in order to cause the application to crash. | 2.3 | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L |
| CVE-2022-31223 | Dell BIOS versions contain an Improper Neutralization of Null Byte vulnerability. A local authenticated administrator user may potentially exploit this vulnerability by sending unexpected null bytes in order to read memory on the system. | 2.3 | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N |
| CVE-2022-31224 | Dell BIOS versions contain an Improper Protection Against Voltage and Clock Glitches vulnerability. An attacker with physical access to the system may potentially exploit this vulnerability by triggering a fault condition in order to change the behavior of the system. | 2.0 | CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N |
| CVE-2022-31225 | Dell BIOS versions contain an Unchecked Return Value vulnerability. A local authenticated administrator user may potentially exploit this vulnerability in order to change the state of the system or cause unexpected failures. | 3.0 | CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H |
| CVE-2022-31226 | Dell BIOS versions contain a Stack-based Buffer Overflow vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by sending excess data to a function in order to gain arbitrary code execution on the system. | 7.1 |
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:L |
See the table below for Dell Client BIOS releases containing resolutions to these vulnerabilities. Dell recommends all customers update at the earliest opportunity.
Go to the Drivers & Downloads site for updates on the applicable products. To learn more, see Dell KB article Dell BIOS Updates, and download the update for your Dell computer.
Customers may use one of the Dell notification solutions to be notified and download driver, BIOS, and firmware updates automatically once available.
Affected Products & Remediation
The Affected Product versions include all supported versions before the BIOS Update Version listed in the table for each product.
| Product | BIOS Update Version | BIOS Release Date (MM-DD-YYYY) |
| ChengMing 3900 | 1.1.66 | 06-27-2022 |
| Inspiron 14 Plus 7420 | 1.2.0 | 06-03-2022 |
| Inspiron 16 Plus 7620 | 1.2.0 | 06-03-2022 |
| Inspiron 3910 | 1.1.66 | 06-27-2022 |
| Inspiron 5320 | 1.1.0 | 04-21-2022 |
| Inspiron 5420 | 1.4.1 | 06-15-2022 |
| Inspiron 5620 | 1.4.1 | 06-15-2022 |
| Inspiron 5620 | 1.4.1 | 06-15-2022 |
| Inspiron 7420 | 1.3.0 | 07-07-2022 |
| Inspiron 7620 | 1.3.0 | 07-07-2022 |
| OptiPlex 3000 | 1.1.66 | 06-27-2022 |
| OptiPlex 3000 Thin Client | 1.0.7 | 06-06-2022 |
| OptiPlex 5000 | 1.3.62 | 06-28-2022 |
| OptiPlex 5400 | 1.0.13 | 06-22-2022 |
| OptiPlex 7000 | 1.3.62 | 06-28-2022 |
| OptiPlex 7000 OEM | 1.3.62 | 06-24-2022 |
| OptiPlex 7400 | 1.0.13 | 06-22-2022 |
| Precision 3460 Small Form Factor | 1.3.62 | 06-27-2022 |
| Precision 3660 Tower | 1.3.71 | 07-07-2022 |
| Precision 5770 | 1.6.0 | 05-05-2022 |
| Vostro 3710 | 1.1.66 | 06-27-2022 |
| Vostro 3910 | 1.1.66 | 06-27-2022 |
| Vostro 5320 | 1.1.0 | 04-21-2022 |
| Vostro 5620 | 1.4.1 | 06-15-2022 |
| Vostro 7620 | 1.2.0 | 06-03-2022 |
| XPS 17 9720 | 1.6.0 | 05-05-2022 |
The Affected Product versions include all supported versions before the BIOS Update Version listed in the table for each product.
| Product | BIOS Update Version | BIOS Release Date (MM-DD-YYYY) |
| ChengMing 3900 | 1.1.66 | 06-27-2022 |
| Inspiron 14 Plus 7420 | 1.2.0 | 06-03-2022 |
| Inspiron 16 Plus 7620 | 1.2.0 | 06-03-2022 |
| Inspiron 3910 | 1.1.66 | 06-27-2022 |
| Inspiron 5320 | 1.1.0 | 04-21-2022 |
| Inspiron 5420 | 1.4.1 | 06-15-2022 |
| Inspiron 5620 | 1.4.1 | 06-15-2022 |
| Inspiron 5620 | 1.4.1 | 06-15-2022 |
| Inspiron 7420 | 1.3.0 | 07-07-2022 |
| Inspiron 7620 | 1.3.0 | 07-07-2022 |
| OptiPlex 3000 | 1.1.66 | 06-27-2022 |
| OptiPlex 3000 Thin Client | 1.0.7 | 06-06-2022 |
| OptiPlex 5000 | 1.3.62 | 06-28-2022 |
| OptiPlex 5400 | 1.0.13 | 06-22-2022 |
| OptiPlex 7000 | 1.3.62 | 06-28-2022 |
| OptiPlex 7000 OEM | 1.3.62 | 06-24-2022 |
| OptiPlex 7400 | 1.0.13 | 06-22-2022 |
| Precision 3460 Small Form Factor | 1.3.62 | 06-27-2022 |
| Precision 3660 Tower | 1.3.71 | 07-07-2022 |
| Precision 5770 | 1.6.0 | 05-05-2022 |
| Vostro 3710 | 1.1.66 | 06-27-2022 |
| Vostro 3910 | 1.1.66 | 06-27-2022 |
| Vostro 5320 | 1.1.0 | 04-21-2022 |
| Vostro 5620 | 1.4.1 | 06-15-2022 |
| Vostro 7620 | 1.2.0 | 06-03-2022 |
| XPS 17 9720 | 1.6.0 | 05-05-2022 |
Revision History
| Revision | Date | Description |
| 1.0 | 2022-08-05 | Initial Release |
Related Information
Legal Disclaimer
Affected Products
Inspiron 14 5420, Inspiron 14 7420 2-in-1, Inspiron 16 7620 2-in-1, Inspiron 16 Plus 7620, Inspiron 3910, OptiPlex 3000 Tower, OptiPlex 3000 Thin Client, Optiplex 5000 Tower, OptiPlex 5400 All-In-One, OptiPlex 7000 Tower, OptiPlex 7400 All-In-One
, Precision 5770, Precision 3460 Small Form Factor, Precision 3660 Tower, Product Security Information, Vostro 5320, Vostro 5620, Vostro 7620, Vostro 3710, Vostro 3910, XPS 17 9720
...
Article Properties
Article Number: 000202196
Article Type: Dell Security Advisory
Last Modified: 08 Jun 2023
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.