DSA-2024-355: Security Update for Dell Client Platform BIOS for an Improper Input Validation Vulnerability
Summary: Dell Client Platform BIOS remediation is available for an Improper Input Validation Vulnerability in an externally developed component that could be exploited by malicious users to compromise the affected system. ...
Impact
High
Details
| Proprietary Code CVEs |
Description |
CVSS Base Score |
CVSS Vector String |
| CVE-2024-47238 |
Dell Client Platform BIOS contains an Improper Input Validation vulnerability in an externally developed component. A high privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary code execution. |
7.5 |
| Proprietary Code CVEs |
Description |
CVSS Base Score |
CVSS Vector String |
| CVE-2024-47238 |
Dell Client Platform BIOS contains an Improper Input Validation vulnerability in an externally developed component. A high privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary code execution. |
7.5 |
Affected Products & Remediation
| Product |
Software/Firmware |
Affected Versions |
Remediated Versions |
Release Date (MM/DD/YYYY) |
Link |
| Dell Edge Gateway 5000 |
BIOS |
Versions prior to 1.29.0 |
Versions 1.29.0 or later |
10/07/2024 |
|
| Edge Gateway 3000 series |
BIOS |
Versions prior to 1.19.0 |
Versions 1.19.0 or later |
10/04/2024 |
|
| Embedded Box PC 3000 |
BIOS |
Versions prior to 1.25.0 |
Versions 1.25.0 or later |
10/09/2024 |
| Product |
Software/Firmware |
Affected Versions |
Remediated Versions |
Release Date (MM/DD/YYYY) |
Link |
| Dell Edge Gateway 5000 |
BIOS |
Versions prior to 1.29.0 |
Versions 1.29.0 or later |
10/07/2024 |
|
| Edge Gateway 3000 series |
BIOS |
Versions prior to 1.19.0 |
Versions 1.19.0 or later |
10/04/2024 |
|
| Embedded Box PC 3000 |
BIOS |
Versions prior to 1.25.0 |
Versions 1.25.0 or later |
10/09/2024 |
Revision History
|
Revision |
Date |
Description |
|
1.0 |
2024-12-12 |
Initial Release |
Acknowledgements
CVE-2024-47238: Dell Technologies would like to thank Eclypsium for reporting this issue.