Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2024-0160


Dell Client Platform contains an incorrect authorization vulnerability. An attacker with physical access to the system could potentially exploit this vulnerability by bypassing BIOS authorization to modify settings in the BIOS.


Security Impact Summary

This vulnerability carries a MEDIUM severity rating with a CVSS v3.1 score of 6.8, with relatively low complexity without requiring user interaction and does not require pre-existing privileges . The vulnerability impacts confidentiality (data exposure), integrity (unauthorized modifications), and availability (service disruption) for affected systems. Impacting 30 products from dell, from dell, from dell and 27 others, organizations running these solutions should prioritize assessment and patching.

Historical Context

Reported in 2024, this vulnerability emerged during an era marked by increased sophistication in supply chain attacks, cloud infrastructure vulnerabilities, and software-as-a-service (SaaS) security challenges. Security practices during this period emphasized zero-trust architectures, container security, and API protection.


Published

2024-06-12T07:15:50.530

Last Modified

2024-11-21T08:45:58.470

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 6.8 (MEDIUM)

Weaknesses
  • Type: Secondary
    CWE-863

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System dell xps_17_9700_firmware < 1.30.0 Yes
Hardware dell xps_17_9700 - No
Operating System dell xps_15_9500_firmware < 1.31.0 Yes
Hardware dell xps_15_9500 - No
Operating System dell vostro_7500_firmware < 1.28.0 Yes
Hardware dell vostro_7500 - No
Operating System dell precision_5750_firmware < 1.30.0 Yes
Hardware dell precision_5750 - No
Operating System dell precision_5550_firmware < 1.31.0 Yes
Hardware dell precision_5550 - No
Operating System dell latitude_3520_firmware < 1.36.0 Yes
Hardware dell latitude_3520 - No
Operating System dell latitude_3510_firmware < 1.29.0 Yes
Hardware dell latitude_3510 - No
Operating System dell latitude_3420_firmware < 1.36.0 Yes
Hardware dell latitude_3420 - No
Operating System dell latitude_3410_firmware < 1.29.0 Yes
Hardware dell latitude_3410 - No
Operating System dell inspiron_7501_firmware < 1.28.0 Yes
Hardware dell inspiron_7501 - No
Operating System dell inspiron_7500_firmware < 1.28.0 Yes
Hardware dell inspiron_7500 - No
Operating System dell g7_7700_firmware < 1.32.0 Yes
Hardware dell g7_7700 - No
Operating System dell g7_7500_firmware < 1.32.0 Yes
Hardware dell g7_7500 - No
Operating System dell g5_5500_firmware < 1.30.0 Yes
Hardware dell g5_5500 - No
Operating System dell g3_3500_firmware < 1.30.0 Yes
Hardware dell g3_3500 - No

References

How SecUtils Interprets This CVE

SecUtils normalizes and enriches National Vulnerability Database (NVD) records by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and providing structured context for security teams. For dell's affected products, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference data to enable rapid vulnerability prioritization and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and security operations.