Page 12 of 60 results (0.015 seconds)

CVSS: 6.5EPSS: 0%CPEs: 256EXPL: 0

Dell UEFI BIOS https stack leveraged by the Dell BIOSConnect feature and Dell HTTPS Boot feature contains an improper certificate validation vulnerability. A remote unauthenticated attacker may exploit this vulnerability using a person-in-the-middle attack which may lead to a denial of service and payload tampering. La pila https de la UEFI de Dell aprovechada por la funcionalidad Dell BIOSConnect y la funcionalidad Dell HTTPS Boot contiene una vulnerabilidad de combrobación de certificados inapropiada. Un atacante remoto no autenticado puede explotar esta vulnerabilidad usando un ataque de tipo person-in-the-middle que puede conllevar a una denegación de servicio y la manipulación de la carga útil • https://www.dell.com/support/kbdoc/en-us/000188682 • CWE-295: Improper Certificate Validation •

CVSS: 8.6EPSS: 0%CPEs: 36EXPL: 0

Select Dell Client Consumer and Commercial platforms include an issue that allows the BIOS Admin password to be changed through Dell's manageability interface without knowledge of the current BIOS Admin password. This could potentially allow an unauthorized actor, with physical access and/or OS administrator privileges to the device, to gain privileged access to the platform and the hard drive. Plataformas Select Dell Client Consumer and Commercial, incluyen un problema que permite cambiar la contraseña de administrador de BIOS por medio de la interfaz de administración de Dell sin conocer la contraseña de administrador de BIOS actual. Potencialmente, esto podría permitir a un actor no autorizado, con acceso físico y/o privilegios de administrador del sistema operativo al dispositivo, obtener acceso privilegiado a la plataforma y al disco duro • https://www.dell.com/support/article/SLN321604 • CWE-158: Improper Neutralization of Null Byte or NUL Character •

CVSS: 7.1EPSS: 0%CPEs: 708EXPL: 0

Dell Client Consumer and Commercial platforms include an improper authorization vulnerability in the Dell Manageability interface for which an unauthorized actor, with local system access with OS administrator privileges, could bypass the BIOS Administrator authentication to restore BIOS Setup configuration to default values. Plataformas Dell Client Consumer and Commercial, incluyen una vulnerabilidad de autorización inapropiada en la interfaz de Administración de Dell para la cual un actor no autorizado, con acceso al sistema local con privilegios de administrador del Sistema Operativo, podría omitir la autenticación del Administrador del BIOS para restaurar la configuración de BIOS Setup a los valores predeterminados • https://www.dell.com/support/article/SLN321726 • CWE-285: Improper Authorization CWE-862: Missing Authorization •

CVSS: 6.1EPSS: 0%CPEs: 348EXPL: 0

Affected Dell Client platforms contain a BIOS Setup configuration authentication bypass vulnerability in the pre-boot Intel Rapid Storage Response Technology (iRST) Manager menu. An attacker with physical access to the system could perform unauthorized changes to the BIOS Setup configuration settings without requiring the BIOS Admin password by selecting the Optimized Defaults option in the pre-boot iRST Manager. Las plataformas afectadas de Dell Client contienen una vulnerabilidad de omisión de autenticación de la configuración de BIOS Setup en el menú de pre-arranque de Intel Rapid Storage Response Technology (iRST). Un atacante con acceso físico al sistema, podría realizar cambios no autorizados en la configuración del BIOS sin requerir la contraseña de BIOS Admin al seleccionar la opción Optimized Defaults en el pre-arranque de iRST Manager. • https://www.dell.com/support/article/SLN320337 • CWE-306: Missing Authentication for Critical Function •

CVSS: 7.1EPSS: 0%CPEs: 226EXPL: 0

Dell Client Consumer and Commercial Platforms contain an Arbitrary File Overwrite Vulnerability. The vulnerability is limited to the Dell Firmware Update Utility during the time window while being executed by an administrator. During this time window, a locally authenticated low-privileged malicious user could exploit this vulnerability by tricking an administrator into overwriting arbitrary files via a symlink attack. The vulnerability does not affect the actual binary payload that the update utility delivers. Dell Client Consumer and Commercial Platforms, contiene una Vulnerabilidad de Sobrescritura de Archivos Arbitrarios. • https://www.dell.com/support/article/SLN320348 • CWE-59: Improper Link Resolution Before File Access ('Link Following') CWE-427: Uncontrolled Search Path Element •