Dell Embedded Box PC 3000 Firmware 1.16.0

CPE Details

Dell Embedded Box PC 3000 Firmware 1.16.0
1.16.0
2023-02-09
00h37 +00:00
2023-02-09
16h49 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:o:dell:embedded_box_pc_3000_firmware:1.16.0:*:*:*:*:*:*:*

Informations

Vendor

dell

Product

embedded_box_pc_3000_firmware

Version

1.16.0

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2024-47238 2024-12-12 17h38 +00:00 Dell Client Platform BIOS contains an Improper Input Validation vulnerability in an externally developed component. A high privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary code execution.
7.5
High
CVE-2024-0158 2024-07-02 06h20 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with admin privileges may potentially exploit this vulnerability to modify a UEFI variable, leading to denial of service and escalation of privileges
6.7
Medium
CVE-2024-22429 2024-05-17 15h20 +00:00 Dell BIOS contains an Improper Input Validation vulnerability. A local authenticated malicious user with admin privileges could potentially exploit this vulnerability, leading to arbitrary code execution.
7.5
High
CVE-2023-28075 2023-08-16 19h15 +00:00 Dell BIOS contain a Time-of-check Time-of-use vulnerability in BIOS. A local authenticated malicious user with physical access to the system could potentially exploit this vulnerability by using a specifically timed DMA transaction during an SMI in order to gain arbitrary code execution on the system.
6.9
Medium
CVE-2023-24571 2023-03-16 09h55 +00:00 Dell BIOS contains an Improper Input Validation vulnerability. A local authenticated malicious user with administrator privileges could potentially exploit this vulnerability to perform arbitrary code execution.
7.5
High
CVE-2022-34398 2023-02-01 05h28 +00:00 Dell BIOS contains a Time-of-check Time-of-use vulnerability. A local authenticated malicious user could\u00a0potentially exploit this vulnerability by using a specifically timed DMA transaction during an SMI to gain arbitrary code execution on the system.
7.5
High