Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2022-22558


Dell PowerEdge Server BIOS and Dell Precision Workstation 7910 and 7920 Rack BIOS contain an Improper SMM communication buffer verification vulnerability. A Local High Privileged attacker could potentially exploit this vulnerability leading to arbitrary writes or denial of service.


Security Impact Summary

This vulnerability carries a MEDIUM severity rating with a CVSS v3.1 score of 5.7, requiring local system access to exploit but requires specific conditions to be met without requiring user interaction . The vulnerability impacts integrity (unauthorized modifications), and availability (service disruption) for affected systems. Impacting 40 products from dell, from dell, from dell and 37 others, organizations running these solutions should prioritize assessment and patching.

Historical Context

Reported in 2022, this vulnerability emerged during an era marked by increased sophistication in supply chain attacks, cloud infrastructure vulnerabilities, and software-as-a-service (SaaS) security challenges. Security practices during this period emphasized zero-trust architectures, container security, and API protection.


Published

2022-04-21T21:15:07.747

Last Modified

2024-11-21T06:47:01.420

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 5.7 (MEDIUM)

CVSSv2 Vector

AV:L/AC:L/Au:N/C:N/I:P/A:P

  • Access Vector: LOCAL
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

3.9

Impact Score

4.9

Weaknesses
  • Type: Secondary
    CWE-119
  • Type: Primary
    CWE-119

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System dell r6415_firmware < 1.18.0 Yes
Hardware dell r6415 - No
Operating System dell r7415_firmware < 1.18.0 Yes
Hardware dell r7415 - No
Operating System dell r7425_firmware < 1.18.0 Yes
Hardware dell r7425 - No
Operating System dell r730_firmware < 2.14.0 Yes
Hardware dell r730 - No
Operating System dell r730xd_firmware < 2.14.0 Yes
Hardware dell r730xd - No
Operating System dell r630_firmware < 2.14.0 Yes
Hardware dell r630 - No
Operating System dell c4130_firmware < 2.14.0 Yes
Hardware dell c4130 - No
Operating System dell m630_firmware < 2.14.0 Yes
Hardware dell m630 - No
Operating System dell m630p_firmware < 2.14.0 Yes
Hardware dell m630p - No
Operating System dell fc630_firmware < 2.14.0 Yes
Hardware dell fc630 - No
Operating System dell fc430_firmware < 2.14.0 Yes
Hardware dell fc430 - No
Operating System dell m830_firmware < 2.14.0 Yes
Hardware dell m830 - No
Operating System dell m830p_firmware < 2.14.0 Yes
Hardware dell m830p - No
Operating System dell fc830_firmware < 2.14.0 Yes
Hardware dell fc830 - No
Operating System dell t630_firmware < 2.14.0 Yes
Hardware dell t630 - No
Operating System dell r530_firmware < 2.14.0 Yes
Hardware dell r530 - No
Operating System dell r430_firmware < 2.14.0 Yes
Hardware dell r430 - No
Operating System dell t430_firmware < 2.14.0 Yes
Hardware dell t430 - No
Operating System dell r830_firmware < 1.14.0 Yes
Hardware dell r830 - No
Operating System dell c6320_firmware < 2.14.1 Yes
Hardware dell c6320 - No

References

How SecUtils Interprets This CVE

SecUtils normalizes and enriches National Vulnerability Database (NVD) records by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and providing structured context for security teams. For dell's affected products, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference data to enable rapid vulnerability prioritization and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and security operations.