Lucene search

K

G5 5590 Firmware Security Vulnerabilities

cve
cve

CVE-2019-3717

Select Dell Client Commercial and Consumer platforms contain an Improper Access Vulnerability. An unauthenticated attacker with physical access to the system could potentially bypass intended Secure Boot restrictions to run unsigned and untrusted code on expansion cards installed in the system duri...

6.8CVSS

6.6AI Score

0.001EPSS

2019-08-05 05:15 PM
37
cve
cve

CVE-2020-5326

Affected Dell Client platforms contain a BIOS Setup configuration authentication bypass vulnerability in the pre-boot Intel Rapid Storage Response Technology (iRST) Manager menu. An attacker with physical access to the system could perform unauthorized changes to the BIOS Setup configuration settin...

6.1CVSS

5.3AI Score

0.001EPSS

2020-02-21 03:15 PM
75
cve
cve

CVE-2021-36323

Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.

7.5CVSS

6.8AI Score

0.0004EPSS

2021-11-12 11:15 PM
22
cve
cve

CVE-2021-36324

Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.

7.5CVSS

6.8AI Score

0.0004EPSS

2021-11-12 11:15 PM
21
cve
cve

CVE-2021-36325

Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.

7.5CVSS

6.9AI Score

0.0004EPSS

2021-11-12 11:15 PM
43
cve
cve

CVE-2021-36342

Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.

7.5CVSS

6.8AI Score

0.0004EPSS

2022-01-24 08:15 PM
35
cve
cve

CVE-2021-36343

Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.

7.5CVSS

6.8AI Score

0.0004EPSS

2022-01-24 08:15 PM
76