Lucene search

K
cvelistDellCVELIST:CVE-2023-28063
HistoryFeb 06, 2024 - 7:38 a.m.

CVE-2023-28063

2024-02-0607:38:54
CWE-195
dell
www.cve.org
1
dell bios
signed to unsigned conversion
vulnerability
denial of service
admin privileges
exploit

6.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

5.1%

Dell BIOS contains a Signed to Unsigned Conversion Error vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to denial of service.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "CPG BIOS",
    "vendor": "Dell",
    "versions": [
      {
        "status": "affected",
        "version": "1.24.0"
      },
      {
        "status": "affected",
        "version": "1.17.0"
      },
      {
        "status": "affected",
        "version": "1.13.0"
      },
      {
        "status": "affected",
        "version": "1.5.1"
      },
      {
        "status": "affected",
        "version": "1.21.0"
      },
      {
        "status": "affected",
        "version": "1.20.0"
      },
      {
        "status": "affected",
        "version": "1.23.0"
      },
      {
        "status": "affected",
        "version": "1.26.0"
      },
      {
        "status": "affected",
        "version": "1.25.0"
      },
      {
        "status": "affected",
        "version": "1.15.0"
      },
      {
        "status": "affected",
        "version": "1.12.0"
      },
      {
        "status": "affected",
        "version": "2.20.0"
      },
      {
        "status": "affected",
        "version": "1.14.0"
      },
      {
        "status": "affected",
        "version": "1.27.0"
      },
      {
        "status": "affected",
        "version": "1.19.0"
      },
      {
        "status": "affected",
        "version": "1.22.1"
      },
      {
        "status": "affected",
        "version": "2.21.0"
      },
      {
        "status": "affected",
        "version": "1.18.0"
      },
      {
        "status": "affected",
        "version": "1.7.0"
      },
      {
        "status": "affected",
        "version": "1.28.0"
      },
      {
        "status": "affected",
        "version": "1.22.0"
      },
      {
        "status": "affected",
        "version": "1.29.0"
      },
      {
        "status": "affected",
        "version": "1.30.0"
      },
      {
        "status": "affected",
        "version": "1.11.0"
      },
      {
        "status": "affected",
        "version": "1.13.1"
      },
      {
        "status": "affected",
        "version": "1.26.1"
      },
      {
        "status": "affected",
        "version": "1.13.2"
      },
      {
        "status": "affected",
        "version": "1.14.1"
      },
      {
        "status": "affected",
        "version": "1.33.0"
      },
      {
        "status": "affected",
        "version": "1.31.0"
      },
      {
        "status": "affected",
        "version": "1.12.1"
      },
      {
        "status": "affected",
        "version": "1.18.1"
      },
      {
        "status": "affected",
        "version": "1.10.0"
      },
      {
        "status": "affected",
        "version": "2.14.0"
      },
      {
        "status": "affected",
        "version": "1.1.28"
      },
      {
        "status": "affected",
        "version": "1.4.1"
      },
      {
        "status": "affected",
        "version": "2.5.1"
      },
      {
        "status": "affected",
        "version": "2.4.0"
      },
      {
        "status": "affected",
        "version": "2.6.1"
      },
      {
        "status": "affected",
        "version": "1.26.8"
      },
      {
        "status": "affected",
        "version": "1.24.1"
      },
      {
        "status": "affected",
        "version": "1.17.1"
      },
      {
        "status": "affected",
        "version": "1.29.1"
      },
      {
        "status": "affected",
        "version": "1.1.0"
      },
      {
        "status": "affected",
        "version": "1.16.0"
      },
      {
        "status": "affected",
        "version": "3.17.0"
      },
      {
        "status": "affected",
        "version": "2.19.0"
      },
      {
        "status": "affected",
        "version": "1.8.1"
      }
    ]
  }
]

6.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

5.1%

Related for CVELIST:CVE-2023-28063