Dell Latitude 7220 Rugged Extreme Tablet

CPE Details

Dell Latitude 7220 Rugged Extreme Tablet
-
2021-08-04
19h30 +00:00
2022-05-10
16h17 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:h:dell:latitude_7220_rugged_extreme_tablet:-:*:*:*:*:*:*:*

Informations

Vendor

dell

Product

latitude_7220_rugged_extreme_tablet

Version

-

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2022-34398 2023-02-01 05h28 +00:00 Dell BIOS contains a Time-of-check Time-of-use vulnerability. A local authenticated malicious user could\u00a0potentially exploit this vulnerability by using a specifically timed DMA transaction during an SMI to gain arbitrary code execution on the system.
7.5
High
CVE-2022-32493 2022-10-12 19h25 +00:00 Dell BIOS contains an Stack-Based Buffer Overflow vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.
7.8
High
CVE-2022-32491 2022-10-12 19h25 +00:00 Dell Client BIOS contains a Buffer Overflow vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by manipulating an SMI to cause an arbitrary write during SMM.
7.8
High
CVE-2022-32489 2022-10-12 19h25 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.
8.2
High
CVE-2022-32488 2022-10-12 19h25 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.
8.2
High
CVE-2022-32487 2022-10-12 19h25 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.
7.8
High
CVE-2022-32485 2022-10-12 19h25 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.
7.8
High
CVE-2022-32484 2022-10-12 19h25 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with admin privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
5.6
Medium
CVE-2022-32483 2022-10-12 19h25 +00:00 Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with admin privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
5.6
Medium
CVE-2022-26861 2022-09-06 20h15 +00:00 Dell BIOS versions contain an Insecure Automated Optimization vulnerability. A local authenticated malicious user could exploit this vulnerability by sending malicious input via SMI to obtain arbitrary code execution during SMM.
7.9
High
CVE-2022-26860 2022-09-06 20h15 +00:00 Dell BIOS versions contain a stack-based buffer overflow vulnerability. A local attacker could exploit this vulnerability by sending malicious input via SMI to bypass security checks resulting in arbitrary code execution in SMM.
7.8
High
CVE-2022-26859 2022-09-06 20h15 +00:00 Dell BIOS contains a race condition vulnerability. A local attacker could exploit this vulnerability by sending malicious input via SMI in order to bypass security checks during SMM.
7
High
CVE-2022-26858 2022-09-06 20h15 +00:00 Dell BIOS versions contain an Improper Authentication vulnerability. A locally authenticated malicious user could potentially exploit this vulnerability by sending malicious input to an SMI in order to bypass security controls.
7.8
High
CVE-2020-5324 2020-02-21 14h50 +00:00 Dell Client Consumer and Commercial Platforms contain an Arbitrary File Overwrite Vulnerability. The vulnerability is limited to the Dell Firmware Update Utility during the time window while being executed by an administrator. During this time window, a locally authenticated low-privileged malicious user could exploit this vulnerability by tricking an administrator into overwriting arbitrary files via a symlink attack. The vulnerability does not affect the actual binary payload that the update utility delivers.
7.1
High