Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2021-36284


Dell BIOS contains an Improper Restriction of Excessive Authentication Attempts vulnerability. A local authenticated malicious administrator could exploit this vulnerability to bypass excessive admin password attempt mitigations in order to carry out a brute force attack.


Security Impact Summary

This vulnerability carries a MEDIUM severity rating with a CVSS v3.1 score of 5.7, requiring local system access to exploit with relatively low complexity without requiring user interaction . The vulnerability impacts limited data confidentiality, limited integrity, and limited availability for affected systems. Impacting 42 products from dell, from dell, from dell and 39 others, organizations running these solutions should prioritize assessment and patching.

Historical Context

Reported in 2021, this vulnerability emerged during an era marked by increased sophistication in supply chain attacks, cloud infrastructure vulnerabilities, and software-as-a-service (SaaS) security challenges. Security practices during this period emphasized zero-trust architectures, container security, and API protection.


Published

2021-09-28T20:15:07.623

Last Modified

2024-11-21T06:13:25.473

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 5.7 (MEDIUM)

CVSSv2 Vector

AV:L/AC:L/Au:N/C:P/I:N/A:N

  • Access Vector: LOCAL
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: NONE
  • Availability Impact: NONE
Exploitability Score

3.9

Impact Score

2.9

Weaknesses
  • Type: Secondary
    CWE-307

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System dell latitude_5310_2-in-1_firmware < 1.7.0 Yes
Hardware dell latitude_5310_2-in-1 - No
Operating System dell latitude_5320_firmware < 1.7.0 Yes
Hardware dell latitude_5320 - No
Operating System dell latitude_5400_firmware < 1.7.1 Yes
Hardware dell latitude_5400 - No
Operating System dell latitude_5411_firmware < 1.6.0 Yes
Hardware dell latitude_5411 - No
Operating System dell latitude_5500_firmware < 1.8.0 Yes
Hardware dell latitude_5500 - No
Operating System dell latitude_5520_firmware < 1.6.0 Yes
Hardware dell latitude_5520 - No
Operating System dell latitude_5511_firmware < 1.7.1 Yes
Hardware dell latitude_5511 - No
Operating System dell latitude_7212_rugged_extreme_tablet_firmware < 1.7.0 Yes
Hardware dell latitude_7212_rugged_extreme_tablet - No
Operating System dell latitude_7280_firmware < 1.9.1 Yes
Hardware dell latitude_7280 - No
Operating System dell latitude_7320_firmware < 1.7.0 Yes
Hardware dell latitude_7320 - No
Operating System dell latitude_7370_firmware < 1.7.1 Yes
Hardware dell latitude_7370 - No
Operating System dell latitude_7420_firmware < 1.7.0 Yes
Hardware dell latitude_7420 - No
Operating System dell latitude_7480_firmware < 1.7.1 Yes
Hardware dell latitude_7480 - No
Operating System dell latitude_9410_firmware < 1.7.1 Yes
Hardware dell latitude_9410 - No
Operating System dell latitude_9510_firmware < 1.7.0 Yes
Hardware dell latitude_9510 - No
Operating System dell latitude_9520_firmware < 1.6.0 Yes
Hardware dell latitude_9520 - No
Operating System dell optiplex_3080_firmware < 1.5.2 Yes
Hardware dell optiplex_3080 - No
Operating System dell optiplex_3280_aio_firmware < 1.2.0 Yes
Hardware dell optiplex_3280_aio - No
Operating System dell optiplex_7480_aio_firmware < 1.2.0 Yes
Hardware dell optiplex_7480_aio - No
Operating System dell precision_3551_ffirmware < 1.6.2 Yes
Hardware dell precision_3551 - No
Operating System dell precision_3640_tower_firmware < 1.7.1 Yes
Hardware dell precision_3640_tower - No

References

How SecUtils Interprets This CVE

SecUtils normalizes and enriches National Vulnerability Database (NVD) records by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and providing structured context for security teams. For dell's affected products, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference data to enable rapid vulnerability prioritization and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and security operations.