Dell G5 5587 Firmware 1.11.1

CPE Details

Dell G5 5587 Firmware 1.11.1
1.11.1
2020-03-06
18h57 +00:00
2020-03-06
18h57 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:o:dell:g5_5587_firmware:1.11.1:*:*:*:*:*:*:*

Informations

Vendor

dell

Product

g5_5587_firmware

Version

1.11.1

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2022-29083 2022-08-09 20h15 +00:00 Prior Dell BIOS versions contain an Improper Authentication vulnerability. An unauthenticated attacker with physical access to the system could potentially exploit this vulnerability by bypassing drive security mechanisms in order to gain access to the system.
6.8
Medium
CVE-2021-36325 2021-11-12 22h15 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.
7.5
High
CVE-2021-36324 2021-11-12 22h15 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.
7.5
High
CVE-2021-36323 2021-11-12 22h15 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.
7.5
High
CVE-2020-5362 2020-06-10 20h40 +00:00 Dell Client Consumer and Commercial platforms include an improper authorization vulnerability in the Dell Manageability interface for which an unauthorized actor, with local system access with OS administrator privileges, could bypass the BIOS Administrator authentication to restore BIOS Setup configuration to default values.
7.1
High
CVE-2020-5324 2020-02-21 14h50 +00:00 Dell Client Consumer and Commercial Platforms contain an Arbitrary File Overwrite Vulnerability. The vulnerability is limited to the Dell Firmware Update Utility during the time window while being executed by an administrator. During this time window, a locally authenticated low-privileged malicious user could exploit this vulnerability by tricking an administrator into overwriting arbitrary files via a symlink attack. The vulnerability does not affect the actual binary payload that the update utility delivers.
7.1
High