3 results (0.001 seconds)

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

Dell Latitude 7202 Rugged Tablet BIOS versions prior to A28 contain a UAF vulnerability in EFI_BOOT_SERVICES in system management mode. A local unauthenticated attacker may exploit this vulnerability by overwriting the EFI_BOOT_SERVICES structure to execute arbitrary code in system management mode. Dell Latitude 7202 Rugged Tablet BIOS versiones anteriores a A28, contienen una vulnerabilidad de tipo UAF en EFI_BOOT_SERVICES en el modo de administración de sistema. Un atacante no autenticado local puede explotar esta vulnerabilidad al sobrescribir la estructura de EFI_BOOT_SERVICES para ejecutar código arbitrario en modo de administración de sistema. • https://www.dell.com/support/article/SLN320792 • CWE-416: Use After Free •

CVSS: 6.1EPSS: 0%CPEs: 348EXPL: 0

Affected Dell Client platforms contain a BIOS Setup configuration authentication bypass vulnerability in the pre-boot Intel Rapid Storage Response Technology (iRST) Manager menu. An attacker with physical access to the system could perform unauthorized changes to the BIOS Setup configuration settings without requiring the BIOS Admin password by selecting the Optimized Defaults option in the pre-boot iRST Manager. Las plataformas afectadas de Dell Client contienen una vulnerabilidad de omisión de autenticación de la configuración de BIOS Setup en el menú de pre-arranque de Intel Rapid Storage Response Technology (iRST). Un atacante con acceso físico al sistema, podría realizar cambios no autorizados en la configuración del BIOS sin requerir la contraseña de BIOS Admin al seleccionar la opción Optimized Defaults en el pre-arranque de iRST Manager. • https://www.dell.com/support/article/SLN320337 • CWE-306: Missing Authentication for Critical Function •

CVSS: 7.2EPSS: 0%CPEs: 482EXPL: 0

Select Dell Client Commercial and Consumer platforms contain an Improper Access Vulnerability. An unauthenticated attacker with physical access to the system could potentially bypass intended Secure Boot restrictions to run unsigned and untrusted code on expansion cards installed in the system during platform boot. Refer to https://www.dell.com/support/article/us/en/04/sln317683/dsa-2019-043-dell-client-improper-access-control-vulnerability?lang=en for versions affected by this vulnerability. Las plataformas Select Dell Client Commercial and Consumer contienen una vulnerabilidad de Acceso Inapropiado. • https://www.dell.com/support/article/us/en/04/sln317683/dsa-2019-043-dell-client-improper-access-control-vulnerability?lang=en •