Article Number: 000203882
High
Third-party Component | CVE(s) | More Information |
Intel® CSME, Intel® SPS, Intel® TXE, Intel® DAL, and Intel® AMT 2019.1 QSR Advisory |
CVE-2019-0086 | INTEL-SA-00213 |
CVE-2019-0091 | ||
CVE-2019-0093 | ||
2019.2 IPU – Intel® CSME, Intel® SPS, Intel® TXE, Intel® AMT, Intel® PTT and Intel® DAL Advisory |
CVE-2019-0169 | INTEL-SA-00241 |
CVE-2019-11147 | ||
CVE-2019-11104 | ||
CVE-2019-11090 | ||
CVE-2019-11087 | ||
CVE-2019-11101 | ||
2020.1 IPU – Intel® CSME, SPS, TXE, AMT, ISM and DAL Advisory | CVE-2020-0536 | INTEL-SA-00295 |
CVE-2020-0539 | ||
CVE-2020-0545 | ||
2020.2 IPU – Intel® CSME, SPS, TXE, AMT and DAL Advisory | CVE-2020-8745 | INTEL-SA-00391 |
CVE-2020-8705 | ||
CVE-2020-12303 | ||
CVE-2020-12355 | ||
2020.2 IPU – BIOS Advisory |
CVE-2020-0587 | INTEL-SA-00358 |
CVE-2020-0591 | ||
CVE-2020-0592 | ||
CVE-2020-0593 | ||
Intel BIOS Platform Sample Code Advisory |
CVE-2020-8738 | INTEL-SA-00390 |
CVE-2020-8739 | ||
CVE-2020-8740 | ||
CVE-2020-8764 | ||
2021.1 IPU – Intel® CSME, SPS and LMS Advisory |
CVE-2020-24507 | INTEL-SA-00459 |
CVE-2020-8703 | ||
2021.1 IPU – BIOS Advisory |
CVE-2020-12358 | INTEL-SA-00463 |
CVE-2020-12360 | ||
CVE-2020-24486 | ||
Intel BSSA DFT Advisory | CVE-2021-0144 | INTEL-SA-00525 |
BIOS Reference Code Advisory | CVE-2021-0157 | INTEL-SA-00562 |
2021.2 IPU - Intel® Processor Breakpoint Control Flow Advisory | CVE-2021-0127 | Intel-SA-00532 |
Intel® CSME, Intel® SPS, Intel® TXE, Intel® DAL, and Intel® AMT 2019.1 QSR Advisory |
CVE-2019-0086 | INTEL-SA-00213 |
CVE-2019-0091 | ||
CVE-2019-0093 |
Proprietary Code CVE(s) | Description | CVSS Base Score | CVSS Vector String |
CVE-2022-34390 | Dell BIOS contains a use of uninitialized variable vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM. | 7.5 |
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H |
CVE-2022-34391 | Dell Client BIOS Versions prior to the remediated version contain an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM. | 7.5 | CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H |
Third-party Component | CVE(s) | More Information |
Intel® CSME, Intel® SPS, Intel® TXE, Intel® DAL, and Intel® AMT 2019.1 QSR Advisory |
CVE-2019-0086 | INTEL-SA-00213 |
CVE-2019-0091 | ||
CVE-2019-0093 | ||
2019.2 IPU – Intel® CSME, Intel® SPS, Intel® TXE, Intel® AMT, Intel® PTT and Intel® DAL Advisory |
CVE-2019-0169 | INTEL-SA-00241 |
CVE-2019-11147 | ||
CVE-2019-11104 | ||
CVE-2019-11090 | ||
CVE-2019-11087 | ||
CVE-2019-11101 | ||
2020.1 IPU – Intel® CSME, SPS, TXE, AMT, ISM and DAL Advisory | CVE-2020-0536 | INTEL-SA-00295 |
CVE-2020-0539 | ||
CVE-2020-0545 | ||
2020.2 IPU – Intel® CSME, SPS, TXE, AMT and DAL Advisory | CVE-2020-8745 | INTEL-SA-00391 |
CVE-2020-8705 | ||
CVE-2020-12303 | ||
CVE-2020-12355 | ||
2020.2 IPU – BIOS Advisory |
CVE-2020-0587 | INTEL-SA-00358 |
CVE-2020-0591 | ||
CVE-2020-0592 | ||
CVE-2020-0593 | ||
Intel BIOS Platform Sample Code Advisory |
CVE-2020-8738 | INTEL-SA-00390 |
CVE-2020-8739 | ||
CVE-2020-8740 | ||
CVE-2020-8764 | ||
2021.1 IPU – Intel® CSME, SPS and LMS Advisory |
CVE-2020-24507 | INTEL-SA-00459 |
CVE-2020-8703 | ||
2021.1 IPU – BIOS Advisory |
CVE-2020-12358 | INTEL-SA-00463 |
CVE-2020-12360 | ||
CVE-2020-24486 | ||
Intel BSSA DFT Advisory | CVE-2021-0144 | INTEL-SA-00525 |
BIOS Reference Code Advisory | CVE-2021-0157 | INTEL-SA-00562 |
2021.2 IPU - Intel® Processor Breakpoint Control Flow Advisory | CVE-2021-0127 | Intel-SA-00532 |
Intel® CSME, Intel® SPS, Intel® TXE, Intel® DAL, and Intel® AMT 2019.1 QSR Advisory |
CVE-2019-0086 | INTEL-SA-00213 |
CVE-2019-0091 | ||
CVE-2019-0093 |
Proprietary Code CVE(s) | Description | CVSS Base Score | CVSS Vector String |
CVE-2022-34390 | Dell BIOS contains a use of uninitialized variable vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM. | 7.5 |
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H |
CVE-2022-34391 | Dell Client BIOS Versions prior to the remediated version contain an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM. | 7.5 | CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H |
Product | BIOS Update Version | BIOS Release Date |
Alienware Area-51 R4 | 2.0.6 | 08/30/2022 |
Alienware Area-51 R5 | 2.0.6 | 08/30/2022 |
Product | BIOS Update Version | BIOS Release Date |
Alienware Area-51 R4 | 2.0.6 | 08/30/2022 |
Alienware Area-51 R5 | 2.0.6 | 08/30/2022 |
None
Revision | Date | Description |
1.0 | 2022/09/30 | Initial Release |
Dell Security Advisories and Notices
Dell Vulnerability Response Policy
CVSS Scoring Guide
Alienware Area-51 R4 and R5, Product Security Information
30 Sep 2022
1
Dell Security Advisory