First published: Wed Jan 18 2023(Updated: )
Dell BIOS contains a stack based buffer overflow vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to send larger than expected input to a parameter in order to gain arbitrary code execution in SMRAM.
Credit: security_alert@emc.com security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dell Alienware M15 A6 Firmware | <1.4.3 | |
Dell Alienware M15 A6 | ||
Dell Alienware M17 R5 Firmware | <1.4.3 | |
Dell Alienware M17 R5 | ||
Dell G15 5525 Firmware | <1.4.3 | |
Dell G15 5525 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-34401 is high with a severity value of 7.5.
Dell Alienware M15 A6 Firmware (up to exclusive version 1.4.3) and Dell Alienware M17 R5 Firmware (up to exclusive version 1.4.3) are affected.
A local authenticated user can exploit CVE-2022-34401 by sending larger than expected input to a parameter using an SMI, gaining arbitrary code execution in SMRAM.
The Common Weakness Enumeration (CWE) for CVE-2022-34401 includes CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer), CWE-787 (Out-of-bounds Write), and CWE-121 (Stack-based Buffer Overflow).
More information about CVE-2022-34401 can be found at the following reference link: [Dell Support](https://www.dell.com/support/kbdoc/000204679).