DSA-2022-096: Dell Client Security Update for Multiple Vulnerabilities
摘要: Dell Client Consumer and Commercial platform remediation is available for multiple SMM vulnerabilities that may exploited by malicious users to compromise the affected systems.
本文适用于
本文不适用于
本文并非针对某种特定的产品。
本文并非包含所有产品版本。
影响
Medium
详情
| Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
| CVE-2022-26862 | Prior Dell BIOS versions contain an Input Validation vulnerability. A locally authenticated malicious user could potentially exploit this vulnerability by sending malicious input to an SMI in order to bypass security controls in SMM. | 6.3 |
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L |
| CVE-2022-26863 | Prior Dell BIOS versions contain an Input Validation vulnerability. A locally authenticated malicious user could potentially exploit this vulnerability by sending malicious input to an SMI in order to bypass security controls in SMM. | 6.3 |
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L |
| CVE-2022-26864 | Prior Dell BIOS versions contain an Input Validation vulnerability. A locally authenticated malicious user could potentially exploit this vulnerability by sending malicious input to an SMI in order to bypass security controls in SMM. | 6.3 | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L |
See the table below for Dell Client BIOS releases containing resolutions to these vulnerabilities. Dell recommends all customers update at the earliest opportunity.
Go to the Drivers and Downloads site for updates on the applicable products. To learn more, see Dell KB article Dell BIOS Updates, and download the update for your Dell computer.
Customers may use one of the Dell notification solutions to be notified and download driver, BIOS, and firmware updates automatically once available.
| Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
| CVE-2022-26862 | Prior Dell BIOS versions contain an Input Validation vulnerability. A locally authenticated malicious user could potentially exploit this vulnerability by sending malicious input to an SMI in order to bypass security controls in SMM. | 6.3 |
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L |
| CVE-2022-26863 | Prior Dell BIOS versions contain an Input Validation vulnerability. A locally authenticated malicious user could potentially exploit this vulnerability by sending malicious input to an SMI in order to bypass security controls in SMM. | 6.3 |
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L |
| CVE-2022-26864 | Prior Dell BIOS versions contain an Input Validation vulnerability. A locally authenticated malicious user could potentially exploit this vulnerability by sending malicious input to an SMI in order to bypass security controls in SMM. | 6.3 | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L |
See the table below for Dell Client BIOS releases containing resolutions to these vulnerabilities. Dell recommends all customers update at the earliest opportunity.
Go to the Drivers and Downloads site for updates on the applicable products. To learn more, see Dell KB article Dell BIOS Updates, and download the update for your Dell computer.
Customers may use one of the Dell notification solutions to be notified and download driver, BIOS, and firmware updates automatically once available.
受影响的产品和补救措施
| Product | Minimum BIOS Version | BIOS Release Date |
| Alienware m15 Ryzen Edition R5 | 1.5.0 | 04/14/2022 |
| Dell G15 5515 Ryzen Edition | 1.6.0 | 04/12/2022 |
| Dell G5 SE 5505 | 1.11.0 | 04/12/2022 |
| Inspiron 27 7775 | 2.16.1 | 04/29/2022 |
| Inspiron 14 5425 | 1.2.1 | 05/05/2022 |
| Inspiron 3275 | 1.9.0 | 04/14/2022 |
| Inspiron 3475 | 1.9.0 | 04/14/2022 |
| Inspiron 11 3180 | 1.4.4 | 04/13/2022 |
| Inspiron 11 3185 2-in-1 | 1.4.4 | 04/13/2022 |
| Inspiron 3195 2-in-1 | 1.4.1 | 04/13/2022 |
| Inspiron 3505 | 1.6.0 | 04/12/2022 |
| Inspiron 15 3515 | 1.5.0 | 04/13/2022 |
| Inspiron 15 3525 | 1.3.0 | 04/26/2022 |
| Inspiron 3585 | 1.7.0 | 05/01/2022 |
| Inspiron 3595 | 1.3.0 | 04/25/2022 |
| Inspiron 3785 | 1.7.0 | 05/01/2022 |
| Inspiron 5405 | 1.7.0 | 04/11/2022 |
| Inspiron 24 5415 All-in-One | 1.5.0 | 06/07/2022 |
| Inspiron 5415 | 1.9.0 | 04/12/2022 |
| Inspiron 5485 | 2.8.0 | 04/25/2022 |
| Inspiron 5485 2-in-1 | 2.8.0 | 04/25/2022 |
| Inspiron 5505 | 1.7.0 | 04/11/2022 |
| Inspiron 5515 | 1.9.0 | 04/12/2022 |
| Inspiron 5575 | 1.6.0 | 04/25/2022 |
| Inspiron 15 5585 | 2.8.0 | 04/25/2022 |
| Inspiron 13 7375 2-in-1 | 1.7.0 | 04/22/2022 |
| Inspiron 7405 2-in-1 | 1.8.0 | 04/12/2022 |
| Inspiron 7415 2-in-1 | 1.9.0 | 04/11/2022 |
| Inspiron 14 7425 2-in-1 | 1.2.1 | 05/05/2022 |
| Vostro 3405 | 1.6.0 | 04/12/2022 |
| Vostro 3515 | 1.5.0 | 04/13/2022 |
| Vostro 3525 | 1.3.0 | 04/26/2022 |
| Vostro 5415 | 1.9.0 | 04/12/2022 |
| Vostro 5515 | 1.9.0 | 04/12/2022 |
| Vostro 5625 | 1.2.1 | 05/05/2022 |
| Product | Minimum BIOS Version | BIOS Release Date |
| Alienware m15 Ryzen Edition R5 | 1.5.0 | 04/14/2022 |
| Dell G15 5515 Ryzen Edition | 1.6.0 | 04/12/2022 |
| Dell G5 SE 5505 | 1.11.0 | 04/12/2022 |
| Inspiron 27 7775 | 2.16.1 | 04/29/2022 |
| Inspiron 14 5425 | 1.2.1 | 05/05/2022 |
| Inspiron 3275 | 1.9.0 | 04/14/2022 |
| Inspiron 3475 | 1.9.0 | 04/14/2022 |
| Inspiron 11 3180 | 1.4.4 | 04/13/2022 |
| Inspiron 11 3185 2-in-1 | 1.4.4 | 04/13/2022 |
| Inspiron 3195 2-in-1 | 1.4.1 | 04/13/2022 |
| Inspiron 3505 | 1.6.0 | 04/12/2022 |
| Inspiron 15 3515 | 1.5.0 | 04/13/2022 |
| Inspiron 15 3525 | 1.3.0 | 04/26/2022 |
| Inspiron 3585 | 1.7.0 | 05/01/2022 |
| Inspiron 3595 | 1.3.0 | 04/25/2022 |
| Inspiron 3785 | 1.7.0 | 05/01/2022 |
| Inspiron 5405 | 1.7.0 | 04/11/2022 |
| Inspiron 24 5415 All-in-One | 1.5.0 | 06/07/2022 |
| Inspiron 5415 | 1.9.0 | 04/12/2022 |
| Inspiron 5485 | 2.8.0 | 04/25/2022 |
| Inspiron 5485 2-in-1 | 2.8.0 | 04/25/2022 |
| Inspiron 5505 | 1.7.0 | 04/11/2022 |
| Inspiron 5515 | 1.9.0 | 04/12/2022 |
| Inspiron 5575 | 1.6.0 | 04/25/2022 |
| Inspiron 15 5585 | 2.8.0 | 04/25/2022 |
| Inspiron 13 7375 2-in-1 | 1.7.0 | 04/22/2022 |
| Inspiron 7405 2-in-1 | 1.8.0 | 04/12/2022 |
| Inspiron 7415 2-in-1 | 1.9.0 | 04/11/2022 |
| Inspiron 14 7425 2-in-1 | 1.2.1 | 05/05/2022 |
| Vostro 3405 | 1.6.0 | 04/12/2022 |
| Vostro 3515 | 1.5.0 | 04/13/2022 |
| Vostro 3525 | 1.3.0 | 04/26/2022 |
| Vostro 5415 | 1.9.0 | 04/12/2022 |
| Vostro 5515 | 1.9.0 | 04/12/2022 |
| Vostro 5625 | 1.2.1 | 05/05/2022 |
修订历史记录
| Revision | Date | Description |
| 1.0 | 2022/06/21 | Initial Release |
确认
Dell Technologies would like to thank JiaWei Yin (yngweijw) for reporting these issues.
相关信息
法律免责声明
受影响的产品
G Series, Alienware, Inspiron, Vostro文章属性
文章编号: 000200568
文章类型: Dell Security Advisory
上次修改时间: 21 6月 2022
从其他戴尔用户那里查找问题的答案
支持服务
检查您的设备是否在支持服务涵盖的范围内。