Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2023-23696

Summary
Assigner-dell
Assigner Org ID-c550e75a-17ff-4988-97f0-544cde3820fe
Published At-07 Feb, 2023 | 09:49
Updated At-25 Mar, 2025 | 15:29
Rejected At-
Credits

Dell Command Intel vPro Out of Band, versions prior to 4.3.1, contain an Improper Authorization vulnerability. A locally authenticated malicious users could potentially exploit this vulnerability in order to write arbitrary files to the system.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:dell
Assigner Org ID:c550e75a-17ff-4988-97f0-544cde3820fe
Published At:07 Feb, 2023 | 09:49
Updated At:25 Mar, 2025 | 15:29
Rejected At:
▼CVE Numbering Authority (CNA)

Dell Command Intel vPro Out of Band, versions prior to 4.3.1, contain an Improper Authorization vulnerability. A locally authenticated malicious users could potentially exploit this vulnerability in order to write arbitrary files to the system.

Affected Products
Vendor
Dell Inc.Dell
Product
Dell Command Intel vPro Out of Band (DCIV)
Default Status
unaffected
Versions
Affected
  • From 0 before 4.4.0 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-285CWE-285: Improper Authorization
Type: CWE
CWE ID: CWE-285
Description: CWE-285: Improper Authorization
Metrics
VersionBase scoreBase severityVector
3.17.0HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 7.0
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.dell.com/support/kbdoc/en-us/000208331/dsa-2023-029-dell-command-intel-vpro-out-of-band-security-update-for-an-improper-authorization-vulnerability
vendor-advisory
Hyperlink: https://www.dell.com/support/kbdoc/en-us/000208331/dsa-2023-029-dell-command-intel-vpro-out-of-band-security-update-for-an-improper-authorization-vulnerability
Resource:
vendor-advisory
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.dell.com/support/kbdoc/en-us/000208331/dsa-2023-029-dell-command-intel-vpro-out-of-band-security-update-for-an-improper-authorization-vulnerability
vendor-advisory
x_transferred
Hyperlink: https://www.dell.com/support/kbdoc/en-us/000208331/dsa-2023-029-dell-command-intel-vpro-out-of-band-security-update-for-an-improper-authorization-vulnerability
Resource:
vendor-advisory
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security_alert@emc.com
Published At:07 Feb, 2023 | 10:15
Updated At:07 Nov, 2023 | 04:07

Dell Command Intel vPro Out of Band, versions prior to 4.3.1, contain an Improper Authorization vulnerability. A locally authenticated malicious users could potentially exploit this vulnerability in order to write arbitrary files to the system.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Secondary3.17.0HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 7.0
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Dell Inc.
dell
>>command_\|_intel_vpro_out_of_band>>Versions before 4.4.0(exclusive)
cpe:2.3:a:dell:command_\|_intel_vpro_out_of_band:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-863Primarynvd@nist.gov
CWE-285Secondarysecurity_alert@emc.com
CWE ID: CWE-863
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-285
Type: Secondary
Source: security_alert@emc.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.dell.com/support/kbdoc/en-us/000208331/dsa-2023-029-dell-command-intel-vpro-out-of-band-security-update-for-an-improper-authorization-vulnerabilitysecurity_alert@emc.com
Patch
Vendor Advisory
Hyperlink: https://www.dell.com/support/kbdoc/en-us/000208331/dsa-2023-029-dell-command-intel-vpro-out-of-band-security-update-for-an-improper-authorization-vulnerability
Source: security_alert@emc.com
Resource:
Patch
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

371Records found

CVE-2020-5348
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-6.8||MEDIUM
EPSS-0.11% / 30.90%
||
7 Day CHG~0.00%
Published-03 Apr, 2020 | 23:20
Updated-17 Sep, 2024 | 03:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell Latitude 7202 Rugged Tablet BIOS versions prior to A28 contain a UAF vulnerability in EFI_BOOT_SERVICES in system management mode. A local unauthenticated attacker may exploit this vulnerability by overwriting the EFI_BOOT_SERVICES structure to execute arbitrary code in system management mode.

Action-Not Available
Vendor-Dell Inc.
Product-latitude_7202_firmwarelatitude_7202CPG BIOS
CWE ID-CWE-416
Use After Free
CVE-2020-5358
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-6.7||MEDIUM
EPSS-0.02% / 2.51%
||
7 Day CHG~0.00%
Published-15 Jun, 2020 | 20:20
Updated-17 Sep, 2024 | 01:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell Encryption versions prior to 10.7 and Dell Endpoint Security Suite versions prior to 2.7 contain a privilege escalation vulnerability due to incorrect permissions. A local malicious user with low privileges could potentially exploit this vulnerability to gain elevated privilege on the affected system with the help of a symbolic link.

Action-Not Available
Vendor-Dell Inc.
Product-encryptionendpoint_security_suite_enterpriseDell Encryption Enterprise
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2024-32853
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-4.4||MEDIUM
EPSS-0.16% / 37.90%
||
7 Day CHG~0.00%
Published-02 Jul, 2024 | 07:03
Updated-02 Aug, 2024 | 02:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell PowerScale OneFS versions 8.2.2.x through 9.7.0.2 contain an execution with unnecessary privileges vulnerability. A local low privileged attacker could potentially exploit this vulnerability, leading to escalation of privileges.

Action-Not Available
Vendor-Dell Inc.
Product-powerscale_onefsPowerScale OneFSpowerscale_onefs
CWE ID-CWE-250
Execution with Unnecessary Privileges
CVE-2021-21511
Matching Score-6
Assigner-Dell
ShareView Details
Matching Score-6
Assigner-Dell
CVSS Score-8.1||HIGH
EPSS-0.15% / 36.47%
||
7 Day CHG~0.00%
Published-15 Feb, 2021 | 22:10
Updated-16 Sep, 2024 | 19:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell EMC Avamar Server, versions 19.3 and 19.4 contain an Improper Authorization vulnerability in the web UI. A remote low privileged attacker could potentially exploit this vulnerability, to gain unauthorized read or modification access to other users' backup data.

Action-Not Available
Vendor-Dell Inc.
Product-emc_integrated_data_protection_applianceemc_avamar_serverAvamar
CWE ID-CWE-285
Improper Authorization
CVE-2021-21552
Matching Score-6
Assigner-Dell
ShareView Details
Matching Score-6
Assigner-Dell
CVSS Score-5.2||MEDIUM
EPSS-0.14% / 34.62%
||
7 Day CHG~0.00%
Published-21 May, 2021 | 20:05
Updated-16 Sep, 2024 | 23:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell Wyse Windows Embedded System versions WIE10 LTSC 2019 and earlier contain an improper authorization vulnerability. A local authenticated malicious user with low privileges may potentially exploit this vulnerability to bypass the restricted environment and perform unauthorized actions on the affected system.

Action-Not Available
Vendor-Microsoft CorporationDell Inc.
Product-wyse_5070_thin_clientwyse_5470_all-in-one_thin_clientwyse_5470_thin_clientwindows_10Wyse Windows Embedded (WES)
CWE ID-CWE-863
Incorrect Authorization
CVE-2022-34405
Matching Score-6
Assigner-Dell
ShareView Details
Matching Score-6
Assigner-Dell
CVSS Score-7.3||HIGH
EPSS-0.07% / 21.38%
||
7 Day CHG~0.00%
Published-25 Jan, 2023 | 16:15
Updated-28 Mar, 2025 | 14:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An improper access control vulnerability was identified in the Realtek audio driver. A local authenticated malicious user may potentially exploit this vulnerability by waiting for an administrator to launch the application and attach to the process to elevate privileges on the system.

Action-Not Available
Vendor-Dell Inc.
Product-alienware_x17_r1g7_7590alienware_m15_ryzen_edition_r5g5_5590g7_7700alienware_m15_r1g5_5500alienware_m17_r3alienware_area_51m_r1alienware_m15_r2g7_7500alienware_aurora_r8alienware_x15_r1realtek_high_definition_audio_driveralienware_aurora_r13g7_7790alienware_m17_r4alienware_m17_r2g5_5090alienware_area_51m_r2alienware_m17_r1alienware_aurora_r10g3_3590g15_5515alienware_m15_r4alienware_m15_r3g3_3500g5_5000alienware_m15_r6g15_5510alienware_aurora_r12alienware_aurora_r9alienware_aurora_r11g15_5511CPG Drivers
CWE ID-CWE-285
Improper Authorization
CVE-2022-34397
Matching Score-6
Assigner-Dell
ShareView Details
Matching Score-6
Assigner-Dell
CVSS Score-6.9||MEDIUM
EPSS-0.02% / 3.29%
||
7 Day CHG~0.00%
Published-13 Feb, 2023 | 09:06
Updated-21 Mar, 2025 | 14:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell Unisphere for PowerMax vApp, VASA Provider vApp, and Solution Enabler vApp version 10.0.0.5 and below contains an authorization bypass vulnerability, allowing users to perform actions in which they are not authorized.

Action-Not Available
Vendor-Dell Inc.
Product-unisphere_for_powermax_virtual_appliancesolutions_enabler_virtual_applianceevasa_provider_virtual_applianceUnisphere for PowerMax
CWE ID-CWE-863
Incorrect Authorization
CVE-2024-0160
Matching Score-6
Assigner-Dell
ShareView Details
Matching Score-6
Assigner-Dell
CVSS Score-6.8||MEDIUM
EPSS-0.03% / 7.66%
||
7 Day CHG~0.00%
Published-12 Jun, 2024 | 06:41
Updated-25 Sep, 2024 | 14:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell Client Platform contains an incorrect authorization vulnerability. An attacker with physical access to the system could potentially exploit this vulnerability by bypassing BIOS authorization to modify settings in the BIOS.

Action-Not Available
Vendor-Dell Inc.
Product-g7_7700_firmwareinspiron_7501_firmwareprecision_5550inspiron_7500_firmwarelatitude_3520_firmwarelatitude_3520g7_7700g5_5500inspiron_7501xps_17_9700latitude_3420precision_5750_firmwarexps_17_9700_firmwareg5_5500_firmwareprecision_5750g7_7500latitude_3420_firmwareprecision_5550_firmwareg3_3500xps_15_9500g7_7500_firmwareg3_3500_firmwarelatitude_3410_firmwarelatitude_3510_firmwarelatitude_3510latitude_3410xps_15_9500_firmwareinspiron_7500vostro_7500vostro_7500_firmwareCPG BIOScpg_bios
CWE ID-CWE-863
Incorrect Authorization
CVE-2022-34434
Matching Score-6
Assigner-Dell
ShareView Details
Matching Score-6
Assigner-Dell
CVSS Score-6.7||MEDIUM
EPSS-0.05% / 16.46%
||
7 Day CHG~0.00%
Published-11 Oct, 2022 | 16:40
Updated-19 May, 2025 | 16:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cloud Mobility for Dell Storage versions 1.3.0 and earlier contains an Improper Access Control vulnerability within the Postgres database. A threat actor with root level access to either the vApp or containerized versions of Cloud Mobility may potentially exploit this vulnerability, leading to the modification or deletion of tables that are required for many of the core functionalities of Cloud Mobility. Exploitation may lead to the compromise of integrity and availability of the normal functionality of the Cloud Mobility application.

Action-Not Available
Vendor-Dell Inc.
Product-cloud_mobility_for_dell_emc_storageCloud Mobility for Dell Storage
CWE ID-CWE-285
Improper Authorization
CVE-2018-15767
Matching Score-6
Assigner-Dell
ShareView Details
Matching Score-6
Assigner-Dell
CVSS Score-8.8||HIGH
EPSS-44.56% / 97.48%
||
7 Day CHG~0.00%
Published-30 Nov, 2018 | 17:00
Updated-17 Sep, 2024 | 03:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Authorization Vulnerability

The Dell OpenManage Network Manager virtual appliance versions prior to 6.5.3 contain an improper authorization vulnerability caused by a misconfiguration in the /etc/sudoers file.

Action-Not Available
Vendor-Dell Inc.
Product-openmanage_network_managerOpenManage Network Manager
CWE ID-CWE-863
Incorrect Authorization
CVE-2018-15774
Matching Score-6
Assigner-Dell
ShareView Details
Matching Score-6
Assigner-Dell
CVSS Score-3.8||LOW
EPSS-0.30% / 52.85%
||
7 Day CHG~0.00%
Published-13 Dec, 2018 | 22:00
Updated-17 Sep, 2024 | 01:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
iDRAC7/iDRAC8/iDRAC9 - Privilege Escalation Vulnerability

Dell EMC iDRAC7/iDRAC8 versions prior to 2.61.60.60 and iDRAC9 versions prior to 3.20.21.20, 3.21.24.22, 3.21.26.22, and 3.23.23.23 contain a privilege escalation vulnerability. An authenticated malicious iDRAC user with operator privileges could potentially exploit a permissions check flaw in the Redfish interface to gain administrator access.

Action-Not Available
Vendor-Dell Inc.
Product-idrac9_firmwareidrac7_firmwareidrac8_firmwareiDRAC
CWE ID-CWE-863
Incorrect Authorization
CVE-2022-26857
Matching Score-6
Assigner-Dell
ShareView Details
Matching Score-6
Assigner-Dell
CVSS Score-9||CRITICAL
EPSS-0.25% / 48.09%
||
7 Day CHG~0.00%
Published-26 May, 2022 | 15:20
Updated-17 Sep, 2024 | 02:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell OpenManage Enterprise Versions 3.8.3 and prior contain an improper authorization vulnerability. A remote authenticated malicious user with low privileges may potentially exploit this vulnerability to bypass blocked functionalities and perform unauthorized actions.

Action-Not Available
Vendor-Dell Inc.
Product-openmanage_enterpriseOpenManage Enterprise
CWE ID-CWE-285
Improper Authorization
CVE-2020-5362
Matching Score-6
Assigner-Dell
ShareView Details
Matching Score-6
Assigner-Dell
CVSS Score-7.1||HIGH
EPSS-0.05% / 15.54%
||
7 Day CHG~0.00%
Published-10 Jun, 2020 | 20:40
Updated-17 Sep, 2024 | 02:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell Client Consumer and Commercial platforms include an improper authorization vulnerability in the Dell Manageability interface for which an unauthorized actor, with local system access with OS administrator privileges, could bypass the BIOS Administrator authentication to restore BIOS Setup configuration to default values.

Action-Not Available
Vendor-Dell Inc.
Product-inspiron_13_2-in-1_7359inspiron_15_7570_firmwarevostro_5391_firmwareinspiron_3470latitude_e7270inspiron_7790_aioinspiron_7591_2_in_1optiplex_5480_aiovostro_3669precision_7820_firmwarevostro_3558_firmwareinspiron_5590_firmwarelatitude_e5550g7_17_7790_firmwareinspiron_14_gaming_7466_firmwareoptiplex_3280_aio_firmwarelatitude_5179inspiron_17_2-in-1_7779latitude_7380_firmwarevostro_3888xps_13_9370inspiron_5570inspiron_7490vostro_3888_firmwareinsprion_5491_aiolatitude_e5270wyse_7040_thin_clientinspiron_15_2-in-1_5578latitude_5590optiplex_5080latitude_5511latitude_7390_2-in-1latitude_7214_rugged_extreme_firmwareinspiron_7501precision_5550inspiron_7580_firmwareprecision_7920inspiron_3583precision_7720vostro_5581_firmwarexps_12_9250_firmwarelatitude_3380_firmwareoptiplex_7760_aioprecision_5530_firmwareinsprion_5491_aio_firmwareoptiplex_5040vostro_15_7580inspiron_14_5468inspiron_13_7370_firmwareprecision_tower_3431_small_form_factor_firmwareinspiron_7391_2_in_1_firmwareinspiron_15_3559_firmwareoptiplex_5050latitude_3460_firmwareg5_15_5500_firmwareinspiron_15_2-in-1_7568_firmwareinspiron_15_gaming_7577latitude_3470optiplex_3050_aioinspiron_5400_2_in1precision_3620_towerxps_13_9360vostro_14_3478_firmwareoptiplex_3060_firmwareinspiron_5490_aio_firmwarelatitude_3590_firmwareinspiron_5557latitude_7490_firmwarelatitude_7250_firmwareinspiron_14_7460_firmwareinspiron_15_2-in-1_7569precision_5520xps_7390_2-in-1_firmwareinspiron_7490_firmwareoptiplex_7480_aioprecision_5720_aiolatitude_5591xps_15_9570inspiron_14_3459inspiron_3471optiplex_5050_firmwareprecision_7520_firmwarelatitude_5175_firmwarelatitude_5250inspiron_13_7370inspiron_7586optiplex_3040_firmwarelatitude_3400optiplex_5070optiplex_7460_aio_firmwarevostro_3458_firmwareoptiplex_7071_towerprecision_3430optiplex_3280_aioinspiron_14_7460latitude_7285_firmwarexps_13_9370_firmwarelatitude_3560vostro_3581_firmwarelatitude_7275vostro_3581latitude_9410optiplex_7070latitude_3570optiplex_7080_firmwarelatitude_5420_rugged_firmwarelatitude_5310inspiron_15_5567vostro_5391optiplex_aio_7470_firmwarelatitude_3301inspiron_5594latitude_5420_ruggedvostro_3268_firmwarevostro_3660latitude_7390_2-in-1_firmwarechengming_3967inspiron_5457latitude_7480_firmwarelatitude_3350_firmwarevostro_14_5468_firmwarelatitude_e5470_firmwarechengming_3977vostro_5090latitude_3190vostro_5370inspiron_5580_firmwareinspiron_3881_firmwarelatitude_5488inspiron_13_2-in-1_7359_firmwarelatitude_7380vostro_14_5468xps_15_9560inspiron_3580_firmwareinspiron_14_gaming_7466inspiron_3781_firmwarelatitude_5550_firmwarevostro_5370_firmwareinspiron_13_2-in-1_7373vostro_3670_firmwareinspiron_15_2-in-1_5568inspiron_15_gaming_7577_firmwareinspiron_13_2-in-1_7378latitude_7214_rugged_extremelatitude_7275_firmwarexps_7380_firmwarelatitude_3310precision_7520latitude_5290_2-in-1vostro_15_3578_firmwarevostro_3660_firmwarewyse_5470_all-in-one_firmwareinspiron_5482precision_7820_towerlatitude_7290optiplex_3240_aiolatitude_7212_rugged_extreme_tablet_firmwareinspiron_17_2-in-1_7773_firmwarelatitude_7480latitude_7210_2_in_1_firmwarevostro_3881inspiron_7391_firmwarewyse_5470_firmwareinspiron_5593latitude_5550inspiron_7580vostro_5390_firmwareinspiron_3668inspiron_5770latitude_3580latitude_7250precision_5820_tower_firmwareinspiron_3668_firmwareinspiron_5559_firmwareinspiron_3493_firmwareinspiron_7590_2_in_1_firmwarevostro_3558vostro_5300latitude_3190_2-in-1_firmwarelatitude_5285inspiron_5480_firmwareinspiron_3590chengming_3967_firmwareoptiplex_xe3_firmwareinspiron_7590vostro_5880vostro_3268latitude_7350_firmwareinspiron_15-3552optiplex_7070_firmwarevostro_3584optiplex_xe3precision_5510latitude_3301_firmwarevostro_3481_firmwarelatitude_5491optiplex_7040inspiron_7386inspiron_5591_2-in-1_firmwareinspiron_11_2-in-1_3158_firmwarelatitude_7280g3_15_3500inspiron_7591_2_in_1_firmwarevostro_3459latitude_5410precision_3541optiplex_7050_firmwareinspiron_7300_2_in_1_firmwareprecision_7730_firmwarelatitude_3379_firmwareprecision_3551inspiron_17_5767precision_5820_towerprecision_7730inspiron_7380precision_3640_tower_firmwarelatitude_7350optiplex_7780_aio_firmwarelatitude_7414_rugged_firmwareg7_17_7790optiplex_aio_7770_firmwareoptiplex_5260_aio_firmwarelatitude_7285g7_15_7590inspiron_13_2-in-1_5379_firmwareinspiron_7391vostro_3671_firmwareinspiron_15_2-in-1_5578_firmwareprecision_3440precision_7510_firmwareinspiron_7300_2_in_1optiplex_5250_firmwarelatitude_e5450inspiron_7390_2_in_1_firmwareinspiron_3576inspiron_3671_firmwareinspiron_14_gaming_7467_firmwareprecision_3550_firmwarevostro_3668_firmwarelatitude_3310_firmwarevostro_15_7580_firmwareinspiron_3781inspiron_3576_firmwareinspiron_5300_firmwareg7_7588_firmwarelatitude_3570_firmwareoptiplex_3050_firmwarevostro_7500inspiron_7590_firmwareinspiron_5491_2_in_1latitude_3460_mobile_thin_clientinspiron_15_3567latitude_7389vostro_3681vostro_3591latitude_3560_firmwareinspiron_5570_firmwareprecision_7920_towervostro_3559_firmwareinspiron_3481inspiron_3780_firmwareprecision_3530g7_7588latitude_5411_firmwarelatitude_3510_firmwareinspiron_3470_firmwareinspiron_3593inspiron_5370latitude_5250_firmwareoptiplex_7460_aioinspiron_5491_2_in_1_firmwareinspiron_3481_firmwareprecision_5530inspiron_15_gaming_7567inspiron_14_3458_firmwarelatitude_7310_firmwareoptiplex_7440_aiooptiplex_7071_tower_firmwareinspiron_3790_firmwareinspiron_3584_firmwarelatitude_9510latitude_5280_mobile_thin_client_firmwarevostro_3591_firmwareinspiron_3583_firmwareinspiron_5770_firmwareinspiron_7586_firmwareprecision_tower_3431_small_form_factorlatitude_3180_firmwarevostro_3681_firmwarevostro_3580_firmwareinspiron_3581_firmwarelatitude_9510_firmwarexps_8900_firmwarexps_15_9570_firmwarelatitude_3490_firmwarelatitude_5300_2-in-1_firmwarevostro_3668latitude_7280_firmwarevostro_3670latitude_5280latitude_5179_firmwareoptiplex_3240_aio_firmwarewyse_7040_thin_client_firmwareinspiron_3880inspiron_5580latitude_5480_firmwarelatitude_e7450_firmwareprecision_3930_rackprecision_5530_2-in_1vostro_3490inspiron_5391g5_15_5590_firmwareinspiron_5598latitude_e5550_firmwareg7_15_7590_firmwarexps_13_2-in-1_9365_firmwarelatitude_3480inspiron_15_2-in-1_5579inspiron_5459xps_13_9300_firmwarelatitude_e7450inspiron_14_3468_firmwarelatitude_5280_mobile_thin_clientvostro_3671inspiron_7591inspiron_13_2-in-1_7368_firmwarelatitude_7310inspiron_7500_2_in_1optiplex_5270_aioinspiron_7500latitude_3379vostro_3584_firmwareinspiron_15_2-in-1_7579_firmwareinspiron_5457_firmwarechengming_3990_firmwarelatitude_3390_2-in-1_firmwarelatitude_7414_ruggedvostro_15_5568inspiron_15_5567_firmwareprecision_3520_firmwareinspiron_5594_firmwarechengming_3980precision_3551_firmwareinspiron_14_5490_firmwareprecision_5530_2-in_1_firmwarevostro_3458optiplex_7060vostro_14_3468_firmwarelatitude_5290_firmwarelatitude_7424_rugged_extremeg5_5090_firmwarelatitude_7390vostro_3491_firmwareg3_15_3590vostro_3480_firmwareprecision_7510inspiron_5490_aioxps_27_aio_7760_firmwarechengming_3991_firmwarevostro_7590_firmwarelatitude_e5250_firmwareprecision_3510_firmwarewyse_5070_thin_client_firmwareinspiron_11_2-in-1_3158inspiron_5759latitude_7389_firmwarelatitude_e7470precision_3630_tower_firmwareinspiron_13_2-in-1_7373_firmwareoptiplex_5040_firmwareinspiron_3581inspiron_15_5566_firmwarelatitude_5424_ruggedlatitude_5488_firmwareinspiron_7590_2_in_1inspiron_5583inspiron_7500_firmwareinspiron_15_3559inspiron_5591_2-in-1precision_3541_firmwarelatitude_3480_mobile_thin_client_firmwareprecision_7920_firmwareinspiron_15_7572xps_27_aio_7760inspiron_3476_firmwarevostro_3881_firmwarevostro_3490_firmwarelatitude_5511_firmwareoptiplex_7040_firmwareinspiron_5493inspiron_17_2-in-1_7779_firmwareprecision_3550latitude_7370latitude_7370_firmwarexps_7380optiplex_5070_firmwareinspiron_7790_aio_firmwarelatitude_3390_2-in-1latitude_3310_2-in-1inspiron_5390_firmwarelatitude_5490inspiron_17_2-in-1_7773inspiron_13_2-in-1_7378_firmwareinspiron_7390_2_in_1vostro_3070_firmwareprecision_5720_aio_firmwarexps_13_2-in-1_9365latitude_3190_2-in-1vostro_3481inspiron_7786latitude_9410_firmwarevostro_7590latitude_5310_2_in_1_firmwareinspiron_17_5767_firmwarelatitude_e7270_firmwarelatitude_5280_firmwareg5_5587_firmwarelatitude_3180inspiron_3268latitude_5300_2-in-1latitude_7424_rugged_extreme_firmwarelatitude_e5470optiplex_3070_firmwareinspiron_15_gaming_7566inspiron_13_2-in-1_5378latitude_7410_firmwarevostro_3667latitude_e7470_firmwareprecision_7720_firmwareinspiron_3476inspiron_3780inspiron_7380_firmwarelatitude_7390_firmwareprecision_7710latitude_5410_firmwarevostro_5090_firmwarelatitude_3400_firmwarelatitude_3510inspiron_15_3568_firmwareinspiron_5584precision_3520latitude_e5570inspiron_3880_firmwareg5_5090optiplex_3050precision_7820_tower_firmwareoptiplex_5080_firmwareinspiron_14_3459_firmwareinspiron_15_7570latitude_e5270_firmwareinspiron_5493_firmwarevostro_3471inspiron_3480_firmwareoptiplex_5060_firmwarevostro_3590vostro_5390latitude_e7250_firmwareinspiron_11_2-in-1_3153vostro_5590_firmwarelatitude_3470_firmwareprecision_7530_firmwareinspiron_3790vostro_3583_firmwareinspiron_15_5566inspiron_15_gaming_7567_firmwarelatitude_3190_firmwareinspiron_5494optiplex_5260_aioinspiron_15_2-in-1_5579_firmwarelatitude_e7270_mobile_thin_clientg3_3779_firmwarexps_13_9300vostro_15_3578latitude_3500_firmwareoptiplex_aio_7770inspiron_13_2-in-1_5379latitude_5285_firmwarelatitude_7210_2_in_1chengming_3991latitude_5288_firmwareinspiron_5559inspiron_7501_firmwareinspiron_5480inspiron_15_2-in-1_7569_firmwareoptiplex_7760_aio_firmwarelatitude_5290_2-in-1_firmwareinspiron_3471_firmwarevostro_3669_firmwareprecision_7710_firmwarelatitude_3590inspiron_5400_2_in1_firmwareinspiron_7472_firmwarechengming_3990optiplex_7780_aiovostro_3583latitude_5491_firmwarevostro_5880_firmwareinspiron_3493inspiron_15_7560xps_15_9560_firmwarevostro_14_3468optiplex_3060optiplex_5060chengming_3988_firmwareinspiron_15_2-in-1_7573_firmwareinspiron_3584inspiron_5482_firmwarelatitude_3410_firmwarevostro_5481wyse_5470_all-in-oneprecision_3530_firmwareinspiron_5583_firmwareinspiron_15_2-in-1_7579latitude_5580_firmwarelatitude_3189vostro_3580inspiron_7472latitude_5175inspiron_14_3467_firmwarevostro_3491inspiron_13_2-in-1_5368vostro_15_3568embedded_box_pc_5000optiplex_7480_aio_firmwareinspiron_15_2-in-1_5568_firmwarexps_7390_2-in-1xps_8900inspiron_3580vostro_3267_firmwarevostro_3470_firmwareg3_3579inspiron_5557_firmwareinspiron_7386_firmwarelatitude_3460_mobile_thin_client_firmwareoptiplex_7080vostro_7500_firmwarelatitude_5480vostro_5471_firmwareinspiron_17_2-in-1_7778_firmwarevostro_3559optiplex_3046g3_15_3500_firmwarelatitude_e7270_mobile_thin_client_firmwarelatitude_5414_rugged_firmwarelatitude_5424_rugged_firmwareinspiron_14_5490inspiron_17_2-in-1_7778inspiron_13_2-in-1_5368_firmwarelatitude_5510vostro_5300_firmwarewyse_5470inspiron_3593_firmwareinspiron_5459_firmwarevostro_3459_firmwareinspiron_5481inspiron_5494_firmwareprecision_3440_firmwareinspiron_7786_firmwarelatitude_3310_2-in-1_firmwarelatitude_5310_2_in_1vostro_15_3568_firmwarelatitude_7410inspiron_3590_firmwareprecision_3430_firmwarelatitude_5411optiplex_7450_firmwareoptiplex_7450optiplex_3050_aio_firmwarexps_15_2-in-1_9575_firmwareinspiron_15_3567_firmwareg3_3579_firmwarevostro_15_5568_firmwarelatitude_3480_firmwarelatitude_3189_firmwarexps_13_9360_firmwarevostro_3590_firmwareinspiron_5498optiplex_7440_aio_firmwareinspiron_14_5468_firmwareinspiron_7591_firmwarexps_15_7500latitude_5290inspiron_5300latitude_5289_firmwareprecision_5550_firmwarechengming_3980_firmwarelatitude_5590_firmwareinspiron_15_7572_firmwareinspiron_5590latitude_3350vostro_5481_firmwarevostro_5490vostro_3267inspiron_14_3467g3_15_3590_firmwareinspiron_3671optiplex_aio_7470inspiron_15_2-in-1_7573inspiron_5582inspiron_5498_firmwareinspiron_13_2-in-1_7368precision_5540vostro_5490_firmwareinspiron_14_3473inspiron_14_3458inspiron_3480optiplex_5270_aio_firmwareinspiron_13_2-in-1_7353latitude_3490latitude_e5450_firmwareprecision_3930_rack_firmwareinspiron_3670inspiron_3793_firmwarelatitude_3300_firmwarevostro_5471precision_3640_towerxps_15_7500_firmwareinspiron_11_2-in-1_3153_firmwareinspiron_5759_firmwareinspiron_7391_2_in_1vostro_5581inspiron_3490latitude_5510_firmwareinspiron_3670_firmwarelatitude_3480_mobile_thin_clientlatitude_7212_rugged_extreme_tabletvostro_15_7570latitude_e5570_firmwareoptiplex_3046_firmwarelatitude_3380inspiron_15_gaming_7566_firmwarelatitude_5289inspiron_5582_firmwarelatitude_3460precision_7820vostro_3471_firmwarelatitude_3410precision_5510_firmwareprecision_3420_towerg5_15_5590wyse_5070_thin_clientinspiron_3881xps_13_9380inspiron_14_gaming_7467precision_3420_tower_firmwareoptiplex_5480_aio_firmwarelatitude_5490_firmwarelatitude_5591_firmwarelatitude_5310_firmwarelatitude_3500vostro_3070inspiron_3793inspiron_5481_firmwareprecision_5520_firmwarexps_12_9250chengming_3988inspiron_13_2-in-1_7353_firmwarelatitude_3300latitude_5580precision_3620_tower_firmwareinspiron_5584_firmwareprecision_5540_firmwarevostro_5590inspiron_3268_firmwarexps_15_2-in-1_9575inspiron_13_2-in-1_5378_firmwarevostro_3480inspiron_7500_2_in_1_firmwareg5_15_5500latitude_5450inspiron_15_3568inspiron_5593_firmwareprecision_3630_towerg5_5587latitude_3580_firmwareinspiron_5598_firmwarevostro_3470latitude_5414_ruggedoptiplex_3070optiplex_3040inspiron_15_2-in-1_7568latitude_5450_firmwarelatitude_7290_firmwareprecision_7530inspiron_5370_firmwarechengming_3977_firmwareinspiron_15_7560_firmwareinspiron_5391_firmwarelatitude_e5250embedded_box_pc_5000_firmwareoptiplex_7050inspiron_14_3468inspiron_3490_firmwareprecision_3510vostro_14_3478xps_13_9380_firmwarelatitude_7490inspiron_5390latitude_5288optiplex_7060_firmwareg3_3779inspiron_15-3552_firmwareinspiron_14_3473_firmwareoptiplex_5250vostro_3667_firmwarelatitude_e7250precision_7920_tower_firmwarevostro_15_7570_firmwareDell Client Consumer and Commercial platforms
CWE ID-CWE-285
Improper Authorization
CWE ID-CWE-862
Missing Authorization
CVE-2020-5356
Matching Score-6
Assigner-Dell
ShareView Details
Matching Score-6
Assigner-Dell
CVSS Score-7.7||HIGH
EPSS-0.17% / 39.10%
||
7 Day CHG~0.00%
Published-06 Jul, 2020 | 17:45
Updated-16 Sep, 2024 | 19:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell PowerProtect Data Manager (PPDM) versions prior to 19.4 and Dell PowerProtect X400 versions prior to 3.2 contain an improper authorization vulnerability. A remote authenticated malicious user may download any file from the affected PowerProtect virtual machines.

Action-Not Available
Vendor-Dell Inc.
Product-powerprotect_x400powerprotect_x400_firmwarepowerprotect_data_managerPower Protect Data Manager
CWE ID-CWE-285
Improper Authorization
CWE ID-CWE-552
Files or Directories Accessible to External Parties
CVE-2020-5372
Matching Score-6
Assigner-Dell
ShareView Details
Matching Score-6
Assigner-Dell
CVSS Score-8.6||HIGH
EPSS-0.66% / 70.23%
||
7 Day CHG~0.00%
Published-06 Jul, 2020 | 17:45
Updated-16 Sep, 2024 | 16:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell EMC PowerStore versions prior to 1.0.1.0.5.002 contain a vulnerability that exposes test interface ports to external network. A remote unauthenticated attacker could potentially cause Denial of Service via test interface ports which are not used during run time environment.

Action-Not Available
Vendor-Dell Inc.
Product-emc_powerstore_5000emc_powerstore_3000emc_powerstore_1000_firmwareemc_powerstore_9000emc_powerstore_7000_firmwareemc_powerstore_5000_firmwareemc_powerstore_7000emc_powerstore_1000emc_powerstore_9000_firmwareemc_powerstore_3000_firmwarePowerStore
CWE ID-CWE-1244
Internal Asset Exposed to Unsafe Debug Access Level or State
CWE ID-CWE-863
Incorrect Authorization
CVE-2020-26183
Matching Score-6
Assigner-Dell
ShareView Details
Matching Score-6
Assigner-Dell
CVSS Score-6.8||MEDIUM
EPSS-0.13% / 33.05%
||
7 Day CHG~0.00%
Published-16 Oct, 2020 | 18:10
Updated-16 Sep, 2024 | 17:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell EMC NetWorker versions prior to 19.3.0.2 contain an improper authorization vulnerability. Certain remote users with low privileges may exploit this vulnerability to perform 'nsrmmdbd' operations in an unintended manner.

Action-Not Available
Vendor-Dell Inc.
Product-emc_networkerNetWorker
CWE ID-CWE-285
Improper Authorization
CWE ID-CWE-552
Files or Directories Accessible to External Parties
CVE-2018-1250
Matching Score-6
Assigner-Dell
ShareView Details
Matching Score-6
Assigner-Dell
CVSS Score-6.5||MEDIUM
EPSS-0.10% / 28.55%
||
7 Day CHG~0.00%
Published-28 Sep, 2018 | 18:00
Updated-17 Sep, 2024 | 04:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell EMC Unity and UnityVSA versions prior to 4.3.1.1525703027 contains an Authorization Bypass vulnerability. A remote authenticated user could potentially exploit this vulnerability to read files in NAS server by directly interacting with certain APIs of Unity OE, bypassing Role-Based Authorization control implemented only in Unisphere GUI.

Action-Not Available
Vendor-Dell Inc.
Product-emc_unityemc_unity_firmwareemc_unityvsaDell EMC UnityVSADell EMC Unity
CWE ID-CWE-863
Incorrect Authorization
CVE-2023-32482
Matching Score-6
Assigner-Dell
ShareView Details
Matching Score-6
Assigner-Dell
CVSS Score-4.9||MEDIUM
EPSS-0.08% / 23.67%
||
7 Day CHG~0.00%
Published-20 Jul, 2023 | 11:31
Updated-17 Oct, 2024 | 14:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Wyse Management Suite versions prior to 4.0 contain an improper authorization vulnerability. An authenticated malicious user with privileged access can push policies to unauthorized tenant group.

Action-Not Available
Vendor-Dell Inc.
Product-wyse_management_suiteWyse Management Suite
CWE ID-CWE-285
Improper Authorization
CWE ID-CWE-863
Incorrect Authorization
CVE-2019-3764
Matching Score-6
Assigner-Dell
ShareView Details
Matching Score-6
Assigner-Dell
CVSS Score-5||MEDIUM
EPSS-0.19% / 40.65%
||
7 Day CHG~0.00%
Published-07 Nov, 2019 | 18:05
Updated-17 Sep, 2024 | 04:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell EMC iDRAC7 versions prior to 2.65.65.65, iDRAC8 versions prior to 2.70.70.70 and iDRAC9 versions prior to 3.36.36.36 contain an improper authorization vulnerability. A remote authenticated malicious iDRAC user with low privileges may potentially exploit this vulnerability to obtain sensitive information such as password hashes.

Action-Not Available
Vendor-Dell Inc.
Product-idrac9_firmwareidrac7_firmwareidrac8_firmwareIntegrated Dell Remote Access Controller (iDRAC)
CWE ID-CWE-285
Improper Authorization
CVE-2023-28055
Matching Score-6
Assigner-Dell
ShareView Details
Matching Score-6
Assigner-Dell
CVSS Score-8.8||HIGH
EPSS-0.07% / 23.05%
||
7 Day CHG~0.00%
Published-26 Sep, 2023 | 13:35
Updated-24 Sep, 2024 | 13:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell NetWorker, Version 19.7 has an improper authorization vulnerability in the NetWorker client. An unauthenticated attacker within the same network could potentially exploit this by manipulating a command leading to gain of complete access to the server file further resulting in information leaks, denial of service, and arbitrary code execution. Dell recommends customers to upgrade at the earliest opportunity.

Action-Not Available
Vendor-Dell Inc.
Product-networkerNetWorker
CWE ID-CWE-285
Improper Authorization
CVE-2025-36578
Matching Score-6
Assigner-Dell
ShareView Details
Matching Score-6
Assigner-Dell
CVSS Score-6.8||MEDIUM
EPSS-0.05% / 16.31%
||
7 Day CHG~0.00%
Published-10 Jun, 2025 | 17:34
Updated-11 Jul, 2025 | 15:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell Wyse Management Suite, versions prior to WMS 5.2, contain an Incorrect Authorization vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Unauthorized access.

Action-Not Available
Vendor-Dell Inc.
Product-wyse_management_suiteWyse Management Suite
CWE ID-CWE-863
Incorrect Authorization
CVE-2022-46752
Matching Score-6
Assigner-Dell
ShareView Details
Matching Score-6
Assigner-Dell
CVSS Score-4.6||MEDIUM
EPSS-0.09% / 27.14%
||
7 Day CHG~0.00%
Published-08 Mar, 2023 | 16:51
Updated-28 Feb, 2025 | 18:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell BIOS contains an Improper Authorization vulnerability. An unauthenticated physical attacker may potentially exploit this vulnerability, leading to denial of service.

Action-Not Available
Vendor-Dell Inc.
Product-latitude_9330inspiron_5310vostro_5510_firmwarexps_15_9510_firmwarelatitude_3520latitude_7330precision_3561_firmwareinspiron_14_plus_7620inspiron_3520latitude_5330_firmwarexps_17_9710_firmwareinspiron_7610precision_7770_firmwarelatitude_rugged_7330precision_7560latitude_3430_firmwarelatitude_5421latitude_9420_firmwarexps_13_9315latitude_7420_firmwareinspiron_7610_firmwarelatitude_9420precision_5470_firmwarelatitude_9330_firmwarevostro_5620_firmwareinspiron_3520_firmwareinspiron_5620_firmwarelatitude_3330vostro_5310inspiron_5510_firmwareprecision_3571precision_7760xps_17_9720_firmwarelatitude_7530latitude_7320latitude_7320_detachablelatitude_9520vostro_3520latitude_3420latitude_7420latitude_rugged_7330_firmwareprecision_7670latitude_5430precision_3570latitude_3530_firmwarexps_13_9320precision_3560_firmwareprecision_7670_firmwarexps_13_9320_firmwarelatitude_5430_ruggedinspiron_3511_firmwarelatitude_5531_firmwareinspiron_5310_firmwareprecision_3571_firmwarelatitude_7530_firmwarevostro_5620latitude_9510precision_3570_firmwareprecision_5770_firmwarelatitude_7520_firmwarelatitude_5431inspiron_5320latitude_3420_firmwarelatitude_5420precision_5760_firmwarevostro_3520_firmwarelatitude_5530_firmwarevostro_3420_firmwareprecision_5470precision_7560_firmwarelatitude_9510_firmwareprecision_7760_firmwareprecision_3470_firmwarelatitude_3530vostro_5510inspiron_3511precision_7770inspiron_5410latitude_7320_detachable_firmwarevostro_3510_firmwareinspiron_7420_firmwareinspiron_5410_firmwarelatitude_5530vostro_5410_firmwarelatitude_5431_firmwarelatitude_5430_rugged_firmwarelatitude_7430inspiron_5510inspiron_5420xps_17_9720latitude_7330_firmwarexps_15_9520_firmwareinspiron_14_plus_7620_firmwareprecision_5560inspiron_14_plus_7420latitude_5531latitude_7430_firmwarelatitude_3330_firmwarevostro_3420xps_13_9315_firmwarevostro_7510_firmwarelatitude_5521latitude_3140vostro_7510precision_5570_firmwareinspiron_7510_firmwarelatitude_7520precision_5570vostro_5320_firmwarelatitude_5421_firmwareinspiron_5420_firmwareinspiron_5620precision_5760inspiron_7420xps_15_9520precision_3470latitude_7320_firmwarexps_17_9710precision_3560vostro_5410vostro_7620_firmwarelatitude_5430_firmwarelatitude_9430vostro_5310_firmwarelatitude_5420_firmwareprecision_3561inspiron_7620_firmwarelatitude_5520inspiron_7510latitude_3320precision_5770xps_13_9315_2-in-1xps_15_9510vostro_5320vostro_7620xps_13_9315_2-in-1_firmwarelatitude_3520_firmwareinspiron_5320_firmwarelatitude_3430inspiron_14_plus_7420_firmwarelatitude_9430_firmwarelatitude_3320_firmwarelatitude_3140_firmwarelatitude_5521_firmwarelatitude_9520_firmwareprecision_5560_firmwarevostro_3510latitude_5330latitude_5520_firmwareinspiron_7620CPG BIOS
CWE ID-CWE-285
Improper Authorization
CVE-2025-26330
Matching Score-6
Assigner-Dell
ShareView Details
Matching Score-6
Assigner-Dell
CVSS Score-7||HIGH
EPSS-0.04% / 8.83%
||
7 Day CHG~0.00%
Published-10 Apr, 2025 | 02:10
Updated-15 Jul, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell PowerScale OneFS, versions 9.4.0.0 through 9.10.0.1, contains an incorrect authorization vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability to access the cluster with previous privileges of a disabled user account.

Action-Not Available
Vendor-Dell Inc.
Product-powerscale_onefsPowerScale OneFS
CWE ID-CWE-863
Incorrect Authorization
CVE-2024-25949
Matching Score-6
Assigner-Dell
ShareView Details
Matching Score-6
Assigner-Dell
CVSS Score-8.8||HIGH
EPSS-1.73% / 81.67%
||
7 Day CHG~0.00%
Published-12 Jun, 2024 | 12:58
Updated-14 Aug, 2024 | 13:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell OS10 Networking Switches, versions10.5.6.x, 10.5.5.x, 10.5.4.x and 10.5.3.x ,contain an improper authorization vulnerability. A remote authenticated attacker could potentially exploit this vulnerability leading to escalation of privileges.

Action-Not Available
Vendor-Dell Inc.
Product-networking_os10SmartFabric OS10 Softwaresmartfabric_os10
CWE ID-CWE-285
Improper Authorization
CVE-2024-42423
Matching Score-6
Assigner-Dell
ShareView Details
Matching Score-6
Assigner-Dell
CVSS Score-6.1||MEDIUM
EPSS-0.09% / 26.38%
||
7 Day CHG~0.00%
Published-10 Sep, 2024 | 14:55
Updated-20 Sep, 2024 | 19:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Citrix Workspace App version 23.9.0.24.4 on Dell ThinOS 2311 contains an Incorrect Authorization vulnerability when Citrix CEB is enabled for WebLogin. A local unauthenticated user with low privileges may potentially exploit this vulnerability to bypass existing controls and perform unauthorized actions leading to information disclosure and tampering.

Action-Not Available
Vendor-Citrix (Cloud Software Group, Inc.)Dell Inc.
Product-workspacethinosWyse Proprietary OS (Modern ThinOS)
CWE ID-CWE-863
Incorrect Authorization
CVE-2024-24900
Matching Score-6
Assigner-Dell
ShareView Details
Matching Score-6
Assigner-Dell
CVSS Score-5.8||MEDIUM
EPSS-0.11% / 30.21%
||
7 Day CHG~0.00%
Published-01 Mar, 2024 | 13:00
Updated-20 May, 2025 | 18:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell Secure Connect Gateway (SCG) Policy Manager, all versions, contain an improper authorization vulnerability. An adjacent network low privileged attacker could potentially exploit this vulnerability, leading to unauthorized devices added to policies. Exploitation may lead to information disclosure and unauthorized access to the system.

Action-Not Available
Vendor-Dell Inc.
Product-policy_manager_for_secure_connect_gatewaySecure Connect Gateway (SCG) Policy Managersecure_connect_gateway_policy_manager
CWE ID-CWE-285
Improper Authorization
CVE-2022-34446
Matching Score-6
Assigner-Dell
ShareView Details
Matching Score-6
Assigner-Dell
CVSS Score-8.8||HIGH
EPSS-0.05% / 14.36%
||
7 Day CHG~0.00%
Published-10 Feb, 2023 | 20:44
Updated-26 Mar, 2025 | 15:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

PowerPath Management Appliance with versions 3.3 & 3.2* contains Authorization Bypass vulnerability. An authenticated remote user with limited privileges (e.g., of role Monitoring) can exploit this issue and gain access to sensitive information, and modify the configuration.

Action-Not Available
Vendor-Dell Inc.
Product-powerpath_management_appliancePowerPath Management Appliance
CWE ID-CWE-285
Improper Authorization
CVE-2020-5333
Matching Score-6
Assigner-Dell
ShareView Details
Matching Score-6
Assigner-Dell
CVSS Score-4.3||MEDIUM
EPSS-0.11% / 30.26%
||
7 Day CHG~0.00%
Published-04 May, 2020 | 18:50
Updated-16 Sep, 2024 | 16:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

RSA Archer, versions prior to 6.7 P3 (6.7.0.3), contain an authorization bypass vulnerability in the REST API. A remote authenticated malicious Archer user could potentially exploit this vulnerability to view unauthorized information.

Action-Not Available
Vendor-Dell Inc.RSA Security LLC
Product-archerRSA Archer
CWE ID-CWE-285
Improper Authorization
CWE ID-CWE-863
Incorrect Authorization
CVE-2020-5318
Matching Score-6
Assigner-Dell
ShareView Details
Matching Score-6
Assigner-Dell
CVSS Score-7.5||HIGH
EPSS-0.31% / 53.64%
||
7 Day CHG~0.00%
Published-06 Feb, 2020 | 17:45
Updated-16 Sep, 2024 | 20:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell EMC Isilon OneFS versions 8.1.2, 8.1.0.4, 8.1.0.3, and 8.0.0.7 contain a vulnerability in some configurations. An attacker may exploit this vulnerability to gain access to restricted files. The non-RAN HTTP and WebDAV file-serving components have a vulnerability wherein when either are enabled, and Basic Authentication is enabled for either or both components, files are accessible without authentication.

Action-Not Available
Vendor-Dell Inc.
Product-emc_isilon_onefsIsilon OneFS
CWE ID-CWE-285
Improper Authorization
CWE ID-CWE-863
Incorrect Authorization
CVE-2024-12831
Matching Score-4
Assigner-Zero Day Initiative
ShareView Details
Matching Score-4
Assigner-Zero Day Initiative
CVSS Score-6.6||MEDIUM
EPSS-0.02% / 2.58%
||
7 Day CHG~0.00%
Published-20 Dec, 2024 | 00:05
Updated-03 Jan, 2025 | 17:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Arista NG Firewall uvm_login Incorrect Authorization Privilege Escalation Vulnerability

Arista NG Firewall uvm_login Incorrect Authorization Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Arista NG Firewall. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the uvm_login module. The issue results from incorrect authorization. An attacker can leverage this to escalate privileges to resources normally protected from the user. Was ZDI-CAN-24324.

Action-Not Available
Vendor-Arista Networks, Inc.
Product-ng_firewallNG Firewall
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-22042
Matching Score-4
Assigner-VMware by Broadcom
ShareView Details
Matching Score-4
Assigner-VMware by Broadcom
CVSS Score-7.8||HIGH
EPSS-0.30% / 52.73%
||
7 Day CHG~0.00%
Published-16 Feb, 2022 | 16:37
Updated-03 Aug, 2024 | 18:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

VMware ESXi contains an unauthorized access vulnerability due to VMX having access to settingsd authorization tickets. A malicious actor with privileges within the VMX process only, may be able to access settingsd service running as a high privileged user.

Action-Not Available
Vendor-n/aVMware (Broadcom Inc.)
Product-esxicloud_foundationVMware ESXi and VMware Cloud Foundation
CWE ID-CWE-863
Incorrect Authorization
CVE-2019-17190
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.12% / 32.38%
||
7 Day CHG~0.00%
Published-27 Jan, 2020 | 15:23
Updated-05 Aug, 2024 | 01:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Local Privilege Escalation issue was discovered in Avast Secure Browser 76.0.1659.101. The vulnerability is due to an insecure ACL set by the AvastBrowserUpdate.exe (which is running as NT AUTHORITY\SYSTEM) when AvastSecureBrowser.exe checks for new updates. When the update check is triggered, the elevated process cleans the ACL of the Update.ini file in %PROGRAMDATA%\Avast Software\Browser\Update\ and sets all privileges to group Everyone. Because any low-privileged user can create, delete, or modify the Update.ini file stored in this location, an attacker with low privileges can create a hard link named Update.ini in this folder, and make it point to a file writable by NT AUTHORITY\SYSTEM. Once AvastBrowserUpdate.exe is triggered by the update check functionality, the DACL is set to a misconfigured value on the crafted Update.ini and, consequently, to the target file that was previously not writable by the low-privileged attacker.

Action-Not Available
Vendor-avastn/a
Product-secure_browsern/a
CWE ID-CWE-863
Incorrect Authorization
CVE-2024-1155
Matching Score-4
Assigner-National Instruments
ShareView Details
Matching Score-4
Assigner-National Instruments
CVSS Score-7.8||HIGH
EPSS-0.11% / 29.82%
||
7 Day CHG~0.00%
Published-20 Feb, 2024 | 14:34
Updated-12 Feb, 2025 | 18:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Incorrect permissions for shared NI SystemLink Elixir based services

Incorrect permissions in the installation directories for shared SystemLink Elixir based services may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-emersonNI
Product-specification_compliance_managerflexloggersystemlink_serverlabview_nxgg_web_development_softwarestatic_test_software_suitedata_record_adsts_software_bundleSystemLink ServerFlexLogger
CWE ID-CWE-276
Incorrect Default Permissions
CWE ID-CWE-863
Incorrect Authorization
CVE-2024-0077
Matching Score-4
Assigner-NVIDIA Corporation
ShareView Details
Matching Score-4
Assigner-NVIDIA Corporation
CVSS Score-7.8||HIGH
EPSS-0.03% / 5.35%
||
7 Day CHG~0.00%
Published-27 Mar, 2024 | 21:52
Updated-27 Aug, 2024 | 16:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CVE

NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU plugin, where it allows a guest OS to allocate resources for which the guest OS is not authorized. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.

Action-Not Available
Vendor-NVIDIA Corporation
Product-vGPU driver, Cloud Gaming drivervirtual_gpu_manager
CWE ID-CWE-285
Improper Authorization
CVE-2009-0034
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-0.05% / 14.74%
||
7 Day CHG~0.00%
Published-30 Jan, 2009 | 19:00
Updated-07 Aug, 2024 | 04:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

parse.c in sudo 1.6.9p17 through 1.6.9p19 does not properly interpret a system group (aka %group) in the sudoers file during authorization decisions for a user who belongs to that group, which allows local users to leverage an applicable sudoers file and gain root privileges via a sudo command.

Action-Not Available
Vendor-gratisoftn/aVMware (Broadcom Inc.)
Product-esxsudon/a
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-20188
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7||HIGH
EPSS-0.08% / 25.58%
||
7 Day CHG~0.00%
Published-11 Feb, 2021 | 15:31
Updated-03 Aug, 2024 | 17:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in podman before 1.7.0. File permissions for non-root users running in a privileged container are not correctly checked. This flaw can be abused by a low-privileged user inside the container to access any other file in the container, even if owned by the root user inside the container. It does not allow to directly escape the container, though being a privileged container means that a lot of security features are disabled when running the container. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Action-Not Available
Vendor-podman_projectn/aRed Hat, Inc.
Product-podmanopenshift_container_platformenterprise_linuxpodman
CWE ID-CWE-863
Incorrect Authorization
CVE-2022-31609
Matching Score-4
Assigner-NVIDIA Corporation
ShareView Details
Matching Score-4
Assigner-NVIDIA Corporation
CVSS Score-7.8||HIGH
EPSS-0.10% / 28.62%
||
7 Day CHG~0.00%
Published-05 Aug, 2022 | 20:30
Updated-03 Aug, 2024 | 07:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA vGPU software contains a vulnerability in the Virtual GPU Manager (vGPU plugin), where it allows the guest VM to allocate resources for which the guest is not authorized. This vulnerability may lead to loss of data integrity and confidentiality, denial of service, or information disclosure.

Action-Not Available
Vendor-NVIDIA Corporation
Product-virtual_gpuNVIDIA Virtual GPU Software and NVIDIA Cloud Gaming
CWE ID-CWE-285
Improper Authorization
CVE-2022-29871
Matching Score-4
Assigner-Intel Corporation
ShareView Details
Matching Score-4
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 18.86%
||
7 Day CHG~0.00%
Published-11 Aug, 2023 | 02:36
Updated-13 Feb, 2025 | 16:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control in the Intel(R) CSME software installer before version 2239.3.7.0 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-xeon_platinum_8153xeon_platinum_8276latom_x6212receleron_j1750core_i7-8705gxeon_platinum_9222core_i7-8665uz270xeon_w-3245mxeon_gold_6230tcore_i3-8300tpentium_j2850xeon_gold_6146core_i7-8706gcore_i7-1068ng7xeon_gold_6126txeon_w-3225core_i5-1035g7core_i7-10850hxeon_gold_5115xeon_platinum_8170xeon_gold_6136hm570core_i5-8400hceleron_j1850core_i7-8700celeron_n6210core_i5-10400fcore_i5-8400wm490xeon_gold_6138core_i3-10300core_i7-10700txeon_gold_6246core_i7-8086kceleron_4305ucore_i5-10210uceleron_n2815xeon_platinum_8164core_i5-8257ucore_i7-8700kcore_i5-10200hxeon_gold_6234xeon_gold_6238rq150converged_security_management_engine_firmwarecore_i5-1035g4celeron_n2940core_i3-8145ucore_i5-10400hceleron_4205uceleron_n5105h670xeon_gold_5215core_i3-10100yceleron_j3455core_i5-10400tcore_i3-8109uxeon_gold_6262vxeon_platinum_8168core_i5-10310ucore_i5-10505c246core_i5-1030g7xeon_gold_5218celeron_n4500cm236hm370pentium_n6415xeon_silver_4109tcore_i3-1000g1core_i7-10510yxeon_gold_5215lxeon_silver_4215rceleron_j3160core_i3-10110uxeon_gold_6138fxeon_gold_5122celeron_n3150celeron_n4100xeon_silver_4210tceleron_n3060xeon_gold_6212ucore_i5-10400hm470core_i5-8400bxeon_silver_4114xeon_gold_6248rcore_i5-10500tecore_i3-10105fcore_i3-8100hhm670xeon_gold_6258rxeon_bronze_3104h110core_i5-l16g7core_i5-10300hceleron_n4120xeon_gold_6240xeon_gold_6240lxeon_gold_6238lxeon_gold_6250core_i5-8350ucore_i9-10980hkw580q270xeon_platinum_8156c236core_i5-8600core_i5-8500tcore_i7-10510uxeon_w-3265mceleron_n2840atom_x6214receleron_j4125core_i3-10100ecore_i3-8100core_i7-1060g7celeron_n2910core_i9-10900celeron_n2930h410h570pentium_n3510xeon_gold_6126fcore_i3-10100txeon_gold_5218tcore_i9-8950hkxeon_gold_6150core_i9-10900ecore_i9-10850kxeon_gold_5220rxeon_gold_6140qm480pentium_n3700core_i9-10900kh270core_i5-8600kxeon_platinum_8160fq470core_i9-10900fcore_i5-8400tpentium_n3520core_i7-8750hxeon_gold_6250lcore_i7-10700core_i5-8365uqm580celeron_j3060b150h510xeon_gold_6210uc252celeron_n3160core_i3-10100term590exeon_gold_6126core_i3-10105tcore_i9-10885hcore_i7-10700fcore_i3-10325pentium_n3540z690core_i7-10750hxeon_silver_4216xeon_gold_6230xeon_platinum_8253q470ecore_i3-8300core_i3-1000g4core_i7-10875hwm690xeon_silver_4116tatom_x6427feq370core_i7-8809gcore_i3-8145ueceleron_j4105xeon_gold_6142fcore_i3-l13g4core_i7-8700bcore_i7-8709gcore_i3-10100b560xeon_gold_6238celeron_j1800xeon_gold_6130celeron_j1900z590core_i3-8100tq670xeon_silver_4208celeron_n4505xeon_platinum_8260h170core_i5-10210yh310wm590core_i7-8557ub660core_i5-10500eatom_x5-e3930xeon_gold_5220sxeon_w-3275mceleron_j3355core_i7-8700tatom_x7-e3950xeon_platinum_9242core_i5-8300hxeon_platinum_9282core_i5-10600tcore_i3-10110yxeon_platinum_8280lcore_i5-10600kfxeon_silver_4110core_i7-8650uxeon_bronze_3204core_i7-10700eceleron_j3355exeon_gold_5119txeon_silver_4108xeon_gold_6130tatom_x6414rec242xeon_silver_4210xeon_gold_6246rz370celeron_n3700core_i7-10870hxeon_gold_5217w480core_i5-1035g1core_i5-1038ng7h420exeon_gold_6230nhm170xeon_w-3265xeon_gold_5218nz170xeon_bronze_3106xeon_gold_6138tcm246xeon_w-3245x299xeon_gold_5120celeron_n3350core_i5-8500bcore_i7-10700kceleron_n3050core_i5-8269uceleron_n5095pentium_silver_j5005core_i5-1030g4celeron_n3520core_i7-10700teceleron_n3000xeon_gold_5220xeon_platinum_8160tceleron_n2807core_i5-10500xeon_silver_4214ratom_x6425exeon_gold_6254pentium_j3710xeon_silver_4114tpentium_j2900xeon_gold_6240yq570xeon_gold_6154core_i7-10710uq670ecore_i7-10700kfh370xeon_gold_6208ucore_i5-8279uxeon_platinum_8268w480epentium_n3530core_i7-8565uxeon_gold_5222xeon_w-3275core_i5-8250uatom_x6425receleron_n2820core_i3-10305b365xeon_silver_4209txeon_silver_4116hm175xeon_gold_6252ncore_i5-8259uxeon_platinum_9221xeon_gold_6244xeon_platinum_8160celeron_n2805celeron_n2806atom_x6416rexeon_gold_6248core_i5-10600kqm170atom_x5-e3940r680eceleron_4305uecore_i3-8140uxeon_platinum_8280core_m3-8100ycore_i9-10900kfcore_i3-10105pentium_n4200q170xeon_gold_6148fb460xeon_gold_6132celeron_n3350exeon_platinum_8256xeon_gold_6152xeon_platinum_8158hm570ecore_i7-8550ucore_i5-10310yceleron_n3010atom_x6211exeon_gold_6222vpentium_j6426core_i5-10500hxeon_platinum_8176xeon_gold_6242core_i5-8260uceleron_n2808celeron_j4025pentium_j4205c422qm175core_i7-10810ub250xeon_gold_6142xeon_platinum_8260yxeon_platinum_8270celeron_j6413c256xeon_gold_6242rxeon_gold_6128xeon_silver_4215core_i7-8850hxeon_gold_5118xeon_gold_6130fcore_i7-10610ucore_i3-10100fw680core_i7-8500yceleron_n2920atom_x6413eb360core_i5-10600xeon_silver_4214xeon_platinum_8276xeon_gold_6238txeon_silver_4210rxeon_silver_4214ycore_i7\+8700core_i5-8210yceleron_n6211xeon_gold_5218bxeon_gold_6138pcore_i5-8365uecore_i7-8665uexeon_platinum_8176fceleron_n4000celeron_n2830celeron_j3455exeon_gold_6240rpentium_n4200ecore_i3-10320core_i9-10900tcore_i5-8200ycore_i3-10300tcore_i5-8310yceleron_n3450qm580eceleron_n5100pentium_n3710celeron_n4020core_i5-8500xeon_gold_6209uh610xeon_silver_4112qm370celeron_j6412xeon_w-3223xeon_gold_6226xeon_gold_6256celeron_n2810xeon_gold_5120txeon_gold_6230rxeon_w-3175xcore_i7-8569uxeon_gold_6252atom_x6200fexeon_gold_6134q250z490core_i5-8265ucore_i5-10500txeon_w-3235h610epentium_gold_5405uxeon_gold_5218rxeon_gold_6226rcore_i3-1005g1celeron_j4005xeon_bronze_3206rcore_i3-8100bcore_i3-10305tcore_i3-8350kxeon_gold_6148c232core_i5-8600tcore_i5-8305gxeon_gold_6144pentium_silver_j5040core_i7-1065g7xeon_platinum_8260lcm238core_i7-8559ucore_i9-10900texeon_platinum_8180z390c420core_i3-8130uh470xeon_gold_5220tIntel(R) CSME software installerintel_csme_software_installer
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-0649
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 0.79%
||
7 Day CHG~0.00%
Published-15 Dec, 2021 | 18:05
Updated-03 Aug, 2024 | 15:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In stopVpnProfile of Vpn.java, there is a possible VPN profile reset due to a permissions bypass. This could lead to local escalation of privilege CONTROL_ALWAYS_ON_VPN with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-191382886

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-0694
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 0.79%
||
7 Day CHG~0.00%
Published-12 Apr, 2022 | 16:11
Updated-03 Aug, 2024 | 15:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In setServiceForegroundInnerLocked of ActiveServices.java, there is a possible way for a background application to regain foreground permissions due to insufficient background restrictions. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-183147114

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-0571
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.63%
||
7 Day CHG~0.00%
Published-22 Jun, 2021 | 10:56
Updated-03 Aug, 2024 | 15:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In ActivityTaskManagerService.startActivity() and AppTaskImpl.startActivity() of ActivityTaskManagerService.java and AppTaskImpl.java, there is possible access to restricted activities due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-137395936

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-0472
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.19%
||
7 Day CHG~0.00%
Published-11 Jun, 2021 | 16:42
Updated-03 Aug, 2024 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In shouldLockKeyguard of LockTaskController.java, there is a possible way to exit App Pinning without a PIN due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-9 Android-10Android ID: A-176801033

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-863
Incorrect Authorization
CVE-2022-31644
Matching Score-4
Assigner-HP Inc.
ShareView Details
Matching Score-4
Assigner-HP Inc.
CVSS Score-7.8||HIGH
EPSS-0.10% / 28.68%
||
7 Day CHG~0.00%
Published-14 Jun, 2023 | 17:06
Updated-30 Dec, 2024 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Potential vulnerabilities have been identified in the system BIOS of certain HP PC products, which might allow arbitrary code execution, escalation of privilege, denial of service, and information disclosure.

Action-Not Available
Vendor-HP Inc.
Product-zbook_studio_g5_firmwareprodesk_600_g2_desktop_minielitedesk_800_g8_tower_firmwarez2_mini_g5_workstation_firmwareelitebook_845_g8eliteone_1000_g2_23.8-in_all-in-one_business_firmwareprodesk_600_g5_small_form_factorprobook_640_g7zhan_66_pro_g3_24_all-in-oneprodesk_680_g2_microtowerengage_flex_pro-c_retail_systemzhan_66_pro_14_g2probook_630_g8_firmwareelitebook_x360_830_g5_firmwareelitebook_x360_830_g5elitedesk_880_g8_towerelitebook_1040_g3_firmwareprodesk_400_g5_desktop_minielite_x2_1013_g3pro_x360_fortis_g10engage_flex_pro-c_retail_system_firmwareeliteone_800_g3_23.8_non-touch_all-in-one_business_firmwareelite_x360_830_g9_2-in-1_firmwareproone_400_g6_24_all-in-one_firmwareprodesk_400_g5_small_form_factorprobook_445_g6pro_tower_400_g9_firmwareelitebook_840_g7_firmwareprobook_445_g7prodesk_400_g5_desktop_mini_firmwareeliteone_800_g3_23.8-inch_touch_gpu_all-in-onezbook_17_g6probook_650_g8_firmwarezbook_studio_g9elitebook_630_g9_firmwareeliteone_800_g4_23.8-inch_non-touch_gpu_all-in-onezbook_fury_17_g7_firmwareprobook_645_g4_firmwarezhan_66_pro_14_g3elitebook_836_g6prodesk_600_g4_small_form_factorzbook_17_g6_firmwarez2_tower_g8_workstation_firmwareelitedesk_805_g6_small_form_factoreliteone_800_g3_23.8-inch_touch_all-in-one_firmwarez2_tower_g8_workstationz2_tower_g5_workstation_firmwareelitebook_850_g5_firmwareeliteone_800_g3_23.8-inch_non-touch_all-in-oneelite_tower_600_g9_firmwarez2_small_form_factor_g8_workstationelite_slice_g2_firmwareelitebook_x360_1030_g7_firmwareelitedesk_800_g4_tower_firmwareelite_tower_880_g9_firmwarezbook_fury_15_g7prodesk_600_g6_microtower_firmwareelitedesk_800_g8_desktop_mini_firmwarezhan_66_pro_15_g3zbook_power_g9elitedesk_800_g8_small_form_factor_firmwareprodesk_400_g4_desktop_mini_firmwareelitebook_x360_1040_g8_firmwaremt46_mobile_thin_client_firmwareelitebook_865_g9elitedesk_800_g5_desktop_minielitedesk_705_g3probook_x360_11_g6_eeprodesk_405_g6_desktop_mini_firmwareeliteone_1000_g1_23.8-in_all-in-one_businesselitebook_840_g5_firmwareelitedesk_800_65w_g2_desktop_minipro_tower_480_g9prodesk_400_g5_microtower_firmwareelitebook_835_g8eliteone_1000_g2_23.8-in_all-in-one_businesselitebook_x360_1030_g8probook_640_g5proone_600_g3_21.5-inch_non-touch_all-in-one_firmwareprodesk_680_g3_microtowerprodesk_405_g4_small_form_factor_firmwareelitedesk_800_95w_g4_desktop_miniprodesk_600_g2_desktop_mini_firmwareprobook_x360_11_g4_ee_firmwareeliteone_800_g3_23.8-inch_non-touch_gpu_all-in-one_firmwareeliteone_1000_g1_27-in_4k_uhd_all-in-one_business_firmwareelite_dragonfly_g2elitebook_830_g6z2_small_form_factor_g4_workstationelite_x360_1040_g9_2-in-1probook_430_g6_firmwareeliteone_800_g5_23.8-inch_all-in-oneprobook_650_g5_firmwarez1_entry_tower_g5_workstationprobook_x360_435_g7_firmwareprobook_x360_11_g6_ee_firmwareelite_x2_1012_g2_firmwareproone_400_g4_20-inch_non-touch_all-in-one_business_firmwarezbook_fury_17_g8z1_entry_tower_g5_workstation_firmwareprodesk_400_g6_microtowerelitedesk_800_g4_small_form_factorelitedesk_705_g4_small_form_factor_firmwareprodesk_600_g6_desktop_minielitebook_x360_830_g7probook_445_g7_firmwareelitebook_x360_1040_g8elitedesk_705_g3_firmwareprobook_450_g5probook_450_g6_firmwareprobook_455_g5probook_430_g5_firmwareelitebook_836_g5_firmwareprobook_650_g7_firmwarezbook_17_g5proone_440_g4_23.8-inch_non-touch_all-in-one_business_firmwarezhan_66_pro_15_g3_firmwareproone_400_g4_23.8-inch_non-touch_all-in-one_businessprobook_440_g7elite_folio_2-in-1elitedesk_705_g4_small_form_factorprodesk_400_g4_microtower_firmwareelite_tower_880_g9z2_tower_g5_workstationelitedesk_800_35w_g2_desktop_minielite_x2_1012_g1_firmwareproone_600_g5_21.5-in_all-in-one_business_firmwareelitebook_865_g9_firmwareelite_tower_600_g9proone_400_g3_20-inch_touch_all-in-one_firmwareelitebook_830_g8_firmwareelitedesk_800_g5_tower_firmwareprodesk_600_g3_microtowerprodesk_400_g4_microtowerpro_tower_400_g9prodesk_480_g6_microtower_firmwareelitebook_845_g9zbook_firefly_14_g7zbook_fury_15_g8eliteone_840_23.8_inch_g9_all-in-oneprodesk_405_g6_desktop_miniproone_400_g2_20-inch_touch_all-in-one_firmwaremp9_g4_retail_systemz2_small_form_factor_g5_workstationprobook_445_g8elitebook_855_g7_firmwareelitebook_x360_830_g8probook_470_g5_firmwareelitedesk_805_g8_small_form_factorelitebook_860_g9_firmwareprobook_455_g7elite_tower_800_g9_firmwareproone_400_g2_20-inch_touch_all-in-oneelitebook_x360_830_g6probook_635_aero_g8_firmwareprodesk_405_g4_desktop_mini_firmwareelitebook_835_g9_firmwarepro_sff_400_g9probook_445_g6_firmwareprobook_445_g9proone_440_g6_24_all-in-one_firmwareprodesk_600_g3_desktop_miniz2_small_form_factor_g5_workstation_firmwareelitebook_645_g9_firmwareelitedesk_800_g6_small_form_factorz2_tower_g4_workstationelitedesk_800_65w_g3_desktop_mini_firmwarezbook_studio_g7elitebook_835_g8_firmwareeliteone_800_g4_23.8-in_all-in-one_businesselitedesk_800_g5_desktop_mini_firmwareproone_400_g6_20_all-in-onezbook_fury_15_g7_firmwarezbook_power_g8_firmwareeliteone_800_g3_23.8_non-touch_all-in-one_businessprobook_640_g8_firmwarezbook_14u_g5_firmwareprodesk_480_g6_microtowermt45_mobile_thin_client_firmwareeliteone_1000_g2_27-in_4k_uhd_all-in-one_businessz1_g9_towerprodesk_600_g2_small_form_factorelite_mini_600_g9elitebook_845_g7_firmwareprodesk_600_g4_small_form_factor_firmwarez2_mini_g5_workstationzhan_66_pro_a_14_g5elitebook_1040_g4probook_x360_11_g3_eeelitebook_735_g5eliteone_800_g3_23.8-inch_touch_all-in-oneelitebook_1040_g9_firmwareelitebook_735_g5_firmwareelitedesk_800_g8_desktop_miniprodesk_400_g6_desktop_mini_firmwareelitebook_846_g5_firmwareelite_mini_800_g9zbook_fury_17_g7proone_440_g5_23.8-in_all-in-one_businessprodesk_400_g6_microtower_firmwareprobook_fortis_g10elitebook_835_g7proone_400_g3_20-inch_touch_all-in-onezbook_14u_g6proone_400_g4_20-inch_non-touch_all-in-one_businesselitebook_755_g5zbook_15u_g6_firmwareelitedesk_800_g4_towerprobook_440_g8prodesk_400_g4_desktop_minielitebook_735_g6proone_400_g6_20_all-in-one_firmwareprobook_455_g9elitedesk_800_g2_small_form_factor_firmwareprobook_640_g5_firmwareprobook_440_g6proone_400_g5_23.8-inch_all-in-one_businessprobook_450_g6z1_g8_towerprobook_630_g8probook_650_g8probook_650_g4_firmwarezbook_firefly_15_g8_firmwareprobook_450_g9zhan_x_13_g2zbook_studio_g5proone_600_g2_21.5-inch_non-touch_all-in-oneelitebook_860_g9elitedesk_800_65w_g3_desktop_minieliteone_800_g4_23.8-inch_touch_gpu_all-in-oneelite_x360_830_g9_2-in-1eliteone_1000_g2_34-in_curved_all-in-one_businessprodesk_600_g5_desktop_mini_firmwareprobook_430_g8z2_mini_g4_workstation_firmwaremt44_mobile_thin_clientprodesk_680_g3_microtower_firmwareelitebook_x360_1040_g7elitebook_830_g9elite_x2_g4zbook_15_g5probook_455_g8prodesk_600_g4_microtower_firmwareelitebook_830_g8elitebook_840_g9_firmwareprodesk_400_g7_microtowerprodesk_600_g6_small_form_factor_firmwareelitedesk_800_g6_desktop_mini_firmwarezhan_66_pro_a_14_g4eliteone_1000_g2_23.8-in_touch_all-in-one_business_firmwareelitebook_x360_830_g8_firmwareeliteone_1000_g1_34-in_curved_all-in-one_business_firmwarezhan_66_pro_a_14_g3_firmwareprobook_445_g8_firmwarezhan_66_pro_14_g4elite_dragonfly_g3zhan_66_pro_g3_22_all-in-oneeliteone_800_g3_23.8-inch_touch_gpu_all-in-one_firmwareprobook_455_g5_firmwareprodesk_480_g5_microtower_firmwareengage_one_pro_aio_systemelitebook_830_g7elitebook_640_g9probook_455_g6_firmwareprodesk_600_g4_microtowerprodesk_405_g4_small_form_factormp9_g2_retail_system_firmwareelite_slicez2_mini_g4_workstationelitedesk_705_g4_workstation_firmwareprobook_440_g6_firmwareelitebook_x360_830_g6_firmwareelitebook_830_g6_firmwareelite_tower_680_g9elitedesk_800_65w_g4_desktop_mini_firmwarezhan_66_pro_g1_firmwareeliteone_800_g6_24_all-in-oneelite_x2_g4_firmwareeliteone_800_g4_23.8-inch_non-touch_all-in-one_firmwarezhan_66_pro_13_g2_firmwareelitebook_x360_830_g7_firmwareengage_go_10_mobile_system_firmwareelite_dragonfly_g3_firmwareelite_dragonfly_g2_firmwareprobook_x360_11_g7_eeelitebook_x360_1030_g3_firmwareelitebook_1030_g1elite_mini_800_g9_firmwareelitebook_645_g9zbook_firefly_16_g9_firmwareproone_400_g5_23.8-inch_all-in-one_business_firmwareelite_sff_600_g9elitedesk_705_g4_microtower_firmwarezhan_66_pro_15_g2_firmwarezhan_66_pro_14_g4_firmwarezbook_firefly_15_g7elitedesk_800_35w_g4_desktop_mini_firmwareproone_440_g6_24_all-in-onezbook_power_g9_firmwareelitebook_845_g8_firmwareprobook_640_g8elitebook_830_g9_firmwarezhan_66_pro_g1elitedesk_705_g4_microtowereliteone_800_g4_23.8-inch_non-touch_gpu_all-in-one_firmwarerp9_g1_retail_system_firmwareelitebook_840_g7elitebook_1050_g1elitedesk_800_g6_small_form_factor_firmwareengage_one_aio_system_firmwaredragonfly_folio_g3_2-in-1prodesk_400_g7_microtower_firmwareelitebook_850_g5zbook_power_g7elite_mini_600_g9_firmwareeliteone_1000_g1_23.8-in_touch_all-in-one_businesselitebook_630_g9elitebook_x360_1040_g6_firmwareelitebook_x360_1030_g4_firmwareprobook_x360_11_g3_ee_firmwarezhan_66_pro_14_g3_firmwareprodesk_400_g5_microtowerproone_600_g2_21.5-inch_touch_all-in-oneelite_folio_2-in-1_firmwareproone_600_g2_21.5-inch_touch_all-in-one_firmwarezhan_66_pro_a_14_g3elitedesk_800_35w_g3_desktop_mini_firmwarezbook_power_g8probook_440_g8_firmwareelitedesk_880_g5_tower_firmwareprodesk_600_g2_microtowerzbook_15_g6_firmwareelite_sff_800_g9elitedesk_880_g6_tower_firmwareeliteone_1000_g1_27-in_4k_uhd_all-in-one_businessprodesk_600_g4_desktop_minizbook_fury_16_g9proone_400_g3_20-inch_non-touch_all-in-onezbook_create_g7_firmwareproone_440_g4_23.8-inch_non-touch_all-in-one_businessprobook_fortis_g10_firmwareelitebook_840_g5mt46_mobile_thin_clientprobook_440_g5proone_440_23.8_inch_g9_all-in-oneprodesk_600_g2_microtower_firmwareeliteone_800_g6_27_all-in-oneproone_600_g5_21.5-in_all-in-one_businesszhan_66_pro_a_14_g4_firmwarezhan_66_pro_g3_24_all-in-one_firmwareelitebook_1050_g1_firmwareelitebook_755_g5_firmwareelitedesk_800_65w_g2_desktop_mini_firmwaredragonfly_folio_g3_2-in-1_firmwareprobook_640_g4probook_455_g9_firmwareproone_600_g3_21.5-inch_non-touch_all-in-oneprobook_445r_g6_firmwareelitedesk_800_95w_g4_desktop_mini_firmwareprodesk_400_g5_small_form_factor_firmwareprodesk_600_g3_small_form_factor_firmwareprodesk_600_g6_desktop_mini_firmwareprodesk_600_g6_firmwarezhan_66_pro_13_g2elite_dragonflyprobook_440_g5_firmwareprodesk_400_g6_small_form_factor_firmwareprodesk_600_g6_small_form_factorelite_dragonfly_maxeliteone_800_g3_23.8-inch_non-touch_all-in-one_firmwareproone_400_g3_20-inch_non-touch_all-in-one_firmwareelitedesk_800_g6_desktop_minizbook_14u_g6_firmwareprobook_445r_g6mt45_mobile_thin_clientprodesk_400_g6_small_form_factorzbook_15_g6eliteone_800_g8_27_all-in-onez2_small_form_factor_g4_workstation_firmwareelitebook_835_g7_firmwareelitebook_745_g5_firmwareelitebook_850_g6_firmwareelitebook_1040_g3probook_430_g8_firmwareprodesk_405_g6_small_form_factor_firmwareelitedesk_800_g5_towerprobook_fortis_g9_firmwareeliteone_800_g4_23.8-inch_touch_all-in-oneprodesk_405_g4_desktop_miniprobook_470_g5z1_g9_tower_firmwareelite_x2_1012_g1zbook_firefly_16_g9elitebook_840_g8probook_640_g4_firmwareelitebook_846_g5z2_small_form_factor_g8_workstation_firmwareprobook_455r_g6_firmwareproone_600_g4_21.5-inch_touch_all-in-one_business_firmwareelite_x360_1040_g9_2-in-1_firmwareelitedesk_800_g2_small_form_factorelitedesk_800_g6_towerengage_go_mobile_systemeliteone_1000_g2_34-in_curved_all-in-one_business_firmwarezbook_17_g5_firmwareproone_440_23.8_inch_g9_all-in-one_firmwareelitedesk_800_65w_g4_desktop_minielitebook_830_g5prodesk_480_g7_firmwareelitebook_640_g9_firmwareelitebook_x360_1040_g6elitebook_840_g6_firmwarezhan_66_pro_15_g2prodesk_400_g4_small_form_factormt44_mobile_thin_client_firmwareelitebook_735_g6_firmwareelitedesk_805_g6_desktop_minizbook_firefly_14_g7_firmwarez1_entry_tower_g6_workstationelitebook_745_g5probook_440_g9eliteone_800_g2_23-inch_touch_all-in-one_firmwareelitedesk_800_g4_workstationpro_x360_fortis_g9_firmwareelitebook_855_g8elitedesk_705_g4_desktop_mini_firmwareelitebook_1030_g1_firmwareelitedesk_805_g8_desktop_mini_firmwareelitedesk_800_g4_workstation_firmwareelitebook_745_g6_firmwareelite_sff_800_g9_firmwareelitedesk_800_g5_small_form_factor_firmwareelitedesk_880_g5_towerelitedesk_800_g4_small_form_factor_firmwareeliteone_800_g8_24_all-in-one_firmwareeliteone_800_g6_24_all-in-one_firmwareelitebook_836_g6_firmwareelitebook_x360_1030_g7probook_x360_11_g5_eeprobook_440_g9_firmwareelitebook_x360_1040_g7_firmwareprobook_x360_440_g1mp9_g2_retail_systemelitedesk_880_g4_towereliteone_800_g4_23.8-inch_non-touch_all-in-oneelitedesk_880_g8_tower_firmwareelite_tower_800_g9elitebook_x360_1040_g5prodesk_400_g3_desktop_mini_firmwareelitedesk_800_g3_tower_firmwareeliteone_800_g3_23.8-inch_non-touch_gpu_all-in-oneeliteone_840_23.8_inch_g9_all-in-one_firmwarezbook_fury_17_g8_firmwareelitebook_850_g8elitebook_835_g9elite_sff_600_g9_firmwareprodesk_680_g4_microtower_firmwareelitedesk_705_g4_desktop_minielitebook_x360_1030_g4eliteone_800_g6_27_all-in-one_firmwareprodesk_400_g3_desktop_minirp9_g1_retail_systemprodesk_680_g2_microtower_firmwareprobook_x360_440_g1_firmwareprodesk_680_g4_microtowerengage_one_aio_systemzbook_15_g5_firmwareeliteone_800_g2_23-inch_non-touch_all-in-one_firmwarez1_entry_tower_g6_workstation_firmwareprobook_455_g8_firmwareprobook_x360_435_g8probook_640_g7_firmwareelitedesk_805_g6_desktop_mini_firmwareelitebook_840_g6eliteone_800_g4_23.8-inch_touch_gpu_all-in-one_firmwareengage_flex_mini_retail_system_firmwareelitedesk_880_g3_tower_firmwareprobook_455_g6elitebook_850_g8_firmwareelite_x2_g8probook_x360_11_g4_eezbook_studio_g9_firmwareprobook_450_g8elitedesk_800_g3_towereliteone_800_g8_24_all-in-oneelitedesk_705_g5_small_form_factor_firmwarezbook_studio_g8_firmwareprodesk_600_g3_small_form_factorprodesk_480_g7prodesk_600_g5_microtowerelitebook_840_aero_g8_firmwareprodesk_680_g6elite_x2_1012_g2proone_400_g4_23.8-inch_non-touch_all-in-one_business_firmwareprobook_450_g9_firmwareeliteone_1000_g1_34-in_curved_all-in-one_businessprobook_445_g9_firmwareelitebook_840_g9prodesk_600_g5_desktop_miniprodesk_600_g2_small_form_factor_firmwareelitedesk_800_g8_small_form_factorprodesk_400_g7_small_form_factorzbook_studio_x360_g5zbook_15u_g6zbook_studio_x360_g5_firmwareproone_400_g6_24_all-in-oneprodesk_600_g5_small_form_factor_firmwareengage_go_10_mobile_systemprodesk_480_g4_microtowerelitedesk_800_35w_g3_desktop_minizbook_firefly_15_g8eliteone_1000_g2_27-in_4k_uhd_all-in-one_business_firmwareproone_400_g2_20-inch_non-touch_all-in-one_firmwareelite_dragonfly_max_firmwarepro_x360_fortis_g10_firmwareprobook_x360_435_g8_firmwarezbook_studio_g7_firmwarezbook_firefly_15_g7_firmwareeliteone_800_g4_23.8-in_all-in-one_business_firmwareengage_one_pro_aio_system_firmwareprodesk_400_g7_small_form_factor_firmwarezbook_15u_g5elitebook_855_g8_firmwareproone_400_g5_20-inch_all-in-one_business_firmwareeliteone_800_g5_23.8-in_all-in-oneelite_x2_1013_g3_firmwareprobook_x360_435_g7elitedesk_705_g5_desktop_minielitebook_830_g7_firmwareengage_go_mobile_system_firmwarepro_x360_fortis_g9elitebook_850_g6probook_450_g7prodesk_680_g6_firmwareproone_440_g5_23.8-in_all-in-one_business_firmwareproone_600_g6_22_all-in-onezhan_66_pro_a_14_g5_firmwareprobook_450_g7_firmwareeliteone_800_g2_23-inch_non-touch_all-in-onepro_mini_400_g9zbook_fury_15_g8_firmwareelitedesk_800_g8_towerelite_tower_680_g9_firmwareprobook_650_g4zbook_fury_16_g9_firmwareelitedesk_705_g5_small_form_factorprobook_650_g5z2_tower_g4_workstation_firmwareeliteone_1000_g1_23.8-in_all-in-one_business_firmwareelitedesk_800_g3_small_form_factorelitedesk_805_g6_small_form_factor_firmwareprodesk_405_g8_desktop_mini_firmwarezbook_create_g7zhan_66_pro_14_g2_firmwareprodesk_405_g8_small_form_factoreliteone_1000_g2_23.8-in_touch_all-in-one_businessprodesk_405_g8_desktop_minielitebook_745_g6elitebook_650_g9_firmwareprobook_430_g6eliteone_800_g5_23.8-inch_all-in-one_firmwareprodesk_480_g5_microtowerengage_flex_pro_retail_system_firmwareelitebook_1040_g9elitebook_x360_1030_g3zhan_66_pro_g5_firmwareprodesk_600_g5_microtower_firmwarezhan_66_pro_g3_22_all-in-one_firmwareprodesk_480_g4_microtower_firmwareprodesk_600_g6zhan_x_13_g2_firmwareelitedesk_880_g3_towerprodesk_600_g6_microtowerpro_mini_400_g9_firmwareprobook_455r_g6probook_430_g7elitebook_650_g9prodesk_405_g8_small_form_factor_firmwareprobook_450_g8_firmwarepro_sff_400_g9_firmwareelitebook_836_g5elitedesk_880_g4_tower_firmwareproone_600_g2_21.5-inch_non-touch_all-in-one_firmwareproone_400_g5_20-inch_all-in-one_businesselitebook_855_g7elitedesk_800_35w_g2_desktop_mini_firmwareprobook_x360_11_g7_ee_firmwareproone_400_g2_20-inch_non-touch_all-in-oneprodesk_400_g6_desktop_minielitedesk_800_g6_tower_firmwareelitedesk_880_g6_towerprobook_650_g7probook_455_g7_firmwareprodesk_405_g6_small_form_factorelite_dragonfly_firmwareproone_480_g3_20-inch_non-touch_all-in_oneelitebook_840_g8_firmwarepro_tower_480_g9_firmwareelitebook_850_g7zbook_firefly_14_g8elitebook_x360_1040_g5_firmwareprobook_430_g5probook_430_g7_firmwarezbook_power_g7_firmwareelitedesk_705_g5_desktop_mini_firmwareprobook_x360_11_g5_ee_firmwareprodesk_600_g3_microtower_firmwarezbook_firefly_14_g8_firmwareeliteone_800_g5_23.8-in_all-in-one_firmwareelite_slice_g2elitebook_845_g7elitebook_850_g7_firmwareelitebook_655_g9elitebook_1040_g4_firmwareelitebook_840_aero_g8probook_450_g5_firmwareelitedesk_800_35w_g4_desktop_miniprodesk_400_g4_small_form_factor_firmwareelite_x2_g8_firmwareelitedesk_800_g3_small_form_factor_firmwareeliteone_800_g8_27_all-in-one_firmwareproone_480_g3_20-inch_non-touch_all-in_one_firmwarezbook_14u_g5elitebook_x360_1030_g8_firmwarezbook_firefly_14_g9eliteone_1000_g1_23.8-in_touch_all-in-one_business_firmwaremp9_g4_retail_system_firmwareelitebook_840r_g4probook_645_g4elitedesk_800_g5_small_form_factorelite_slice_firmwareelitedesk_705_g4_workstationelitedesk_805_g8_desktop_miniz1_g8_tower_firmwareengage_flex_mini_retail_systemeliteone_800_g4_23.8-inch_touch_all-in-one_firmwarezbook_studio_g8elitebook_845_g9_firmwareprobook_635_aero_g8probook_440_g7_firmwareprodesk_600_g3_desktop_mini_firmwarezbook_15u_g5_firmwareproone_600_g6_22_all-in-one_firmwareelitebook_655_g9_firmwareelitedesk_805_g8_small_form_factor_firmwareengage_flex_pro_retail_systemelitebook_830_g5_firmwareelitebook_840r_g4_firmwarezhan_66_pro_g5eliteone_800_g2_23-inch_touch_all-in-onezbook_firefly_14_g9_firmwareproone_600_g4_21.5-inch_touch_all-in-one_businessprodesk_600_g4_desktop_mini_firmwareprobook_fortis_g9HP PC BIOS
CWE ID-CWE-863
Incorrect Authorization
CVE-2022-28776
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-5.9||MEDIUM
EPSS-0.05% / 14.87%
||
7 Day CHG~0.00%
Published-11 Apr, 2022 | 19:37
Updated-03 Aug, 2024 | 06:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control vulnerability in Galaxy Store prior to version 4.5.36.4 allows attacker to install applications from Galaxy Store without user interactions.

Action-Not Available
Vendor-SamsungSamsung Electronics
Product-galaxy_storeGalaxy Store
CWE ID-CWE-285
Improper Authorization
CVE-2021-0376
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.19%
||
7 Day CHG~0.00%
Published-10 Mar, 2021 | 15:57
Updated-03 Aug, 2024 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In checkUriPermission and related functions of MediaProvider.java, there is a possible way to access external files due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-115619667

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-863
Incorrect Authorization
CVE-2022-31646
Matching Score-4
Assigner-HP Inc.
ShareView Details
Matching Score-4
Assigner-HP Inc.
CVSS Score-7.8||HIGH
EPSS-0.10% / 28.68%
||
7 Day CHG~0.00%
Published-14 Jun, 2023 | 17:07
Updated-30 Dec, 2024 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Potential vulnerabilities have been identified in the system BIOS of certain HP PC products, which might allow arbitrary code execution, escalation of privilege, denial of service, and information disclosure.

Action-Not Available
Vendor-HP Inc.
Product-zbook_studio_g5_firmwareprodesk_600_g2_desktop_minielitedesk_800_g8_tower_firmwarez2_mini_g5_workstation_firmwareelitebook_845_g8eliteone_1000_g2_23.8-in_all-in-one_business_firmwareprodesk_600_g5_small_form_factorprobook_640_g7zhan_66_pro_g3_24_all-in-oneprodesk_680_g2_microtowerengage_flex_pro-c_retail_systemzhan_66_pro_14_g2probook_630_g8_firmwareelitebook_x360_830_g5_firmwareelitebook_x360_830_g5elitedesk_880_g8_towerelitebook_1040_g3_firmwareprodesk_400_g5_desktop_minielite_x2_1013_g3pro_x360_fortis_g10engage_flex_pro-c_retail_system_firmwareeliteone_800_g3_23.8_non-touch_all-in-one_business_firmwareelite_x360_830_g9_2-in-1_firmwareproone_400_g6_24_all-in-one_firmwareprodesk_400_g5_small_form_factorprobook_445_g6pro_tower_400_g9_firmwareelitebook_840_g7_firmwareprobook_445_g7prodesk_400_g5_desktop_mini_firmwareeliteone_800_g3_23.8-inch_touch_gpu_all-in-onezbook_17_g6probook_650_g8_firmwarezbook_studio_g9elitebook_630_g9_firmwareeliteone_800_g4_23.8-inch_non-touch_gpu_all-in-onezbook_fury_17_g7_firmwareprobook_645_g4_firmwarezhan_66_pro_14_g3elitebook_836_g6prodesk_600_g4_small_form_factorzbook_17_g6_firmwarez2_tower_g8_workstation_firmwareelitedesk_805_g6_small_form_factoreliteone_800_g3_23.8-inch_touch_all-in-one_firmwarez2_tower_g8_workstationz2_tower_g5_workstation_firmwareelitebook_850_g5_firmwareeliteone_800_g3_23.8-inch_non-touch_all-in-oneelite_tower_600_g9_firmwarez2_small_form_factor_g8_workstationelite_slice_g2_firmwareelitebook_x360_1030_g7_firmwareelitedesk_800_g4_tower_firmwareelite_tower_880_g9_firmwarezbook_fury_15_g7prodesk_600_g6_microtower_firmwareelitedesk_800_g8_desktop_mini_firmwarezhan_66_pro_15_g3zbook_power_g9elitedesk_800_g8_small_form_factor_firmwareprodesk_400_g4_desktop_mini_firmwareelitebook_x360_1040_g8_firmwaremt46_mobile_thin_client_firmwareelitebook_865_g9elitedesk_800_g5_desktop_minielitedesk_705_g3probook_x360_11_g6_eeprodesk_405_g6_desktop_mini_firmwareeliteone_1000_g1_23.8-in_all-in-one_businesselitebook_840_g5_firmwareelitedesk_800_65w_g2_desktop_minipro_tower_480_g9prodesk_400_g5_microtower_firmwareelitebook_835_g8eliteone_1000_g2_23.8-in_all-in-one_businesselitebook_x360_1030_g8probook_640_g5proone_600_g3_21.5-inch_non-touch_all-in-one_firmwareprodesk_680_g3_microtowerprodesk_405_g4_small_form_factor_firmwareelitedesk_800_95w_g4_desktop_miniprodesk_600_g2_desktop_mini_firmwareprobook_x360_11_g4_ee_firmwareeliteone_800_g3_23.8-inch_non-touch_gpu_all-in-one_firmwareeliteone_1000_g1_27-in_4k_uhd_all-in-one_business_firmwareelite_dragonfly_g2elitebook_830_g6z2_small_form_factor_g4_workstationelite_x360_1040_g9_2-in-1probook_430_g6_firmwareeliteone_800_g5_23.8-inch_all-in-oneprobook_650_g5_firmwarez1_entry_tower_g5_workstationprobook_x360_435_g7_firmwareprobook_x360_11_g6_ee_firmwareelite_x2_1012_g2_firmwareproone_400_g4_20-inch_non-touch_all-in-one_business_firmwarezbook_fury_17_g8z1_entry_tower_g5_workstation_firmwareprodesk_400_g6_microtowerelitedesk_800_g4_small_form_factorelitedesk_705_g4_small_form_factor_firmwareprodesk_600_g6_desktop_minielitebook_x360_830_g7probook_445_g7_firmwareelitebook_x360_1040_g8elitedesk_705_g3_firmwareprobook_450_g5probook_450_g6_firmwareprobook_455_g5probook_430_g5_firmwareelitebook_836_g5_firmwareprobook_650_g7_firmwarezbook_17_g5proone_440_g4_23.8-inch_non-touch_all-in-one_business_firmwarezhan_66_pro_15_g3_firmwareproone_400_g4_23.8-inch_non-touch_all-in-one_businessprobook_440_g7elite_folio_2-in-1elitedesk_705_g4_small_form_factorprodesk_400_g4_microtower_firmwareelite_tower_880_g9z2_tower_g5_workstationelitedesk_800_35w_g2_desktop_minielite_x2_1012_g1_firmwareproone_600_g5_21.5-in_all-in-one_business_firmwareelitebook_865_g9_firmwareelite_tower_600_g9proone_400_g3_20-inch_touch_all-in-one_firmwareelitebook_830_g8_firmwareelitedesk_800_g5_tower_firmwareprodesk_600_g3_microtowerprodesk_400_g4_microtowerpro_tower_400_g9prodesk_480_g6_microtower_firmwareelitebook_845_g9zbook_firefly_14_g7zbook_fury_15_g8eliteone_840_23.8_inch_g9_all-in-oneprodesk_405_g6_desktop_miniproone_400_g2_20-inch_touch_all-in-one_firmwaremp9_g4_retail_systemz2_small_form_factor_g5_workstationprobook_445_g8elitebook_855_g7_firmwareelitebook_x360_830_g8probook_470_g5_firmwareelitedesk_805_g8_small_form_factorelitebook_860_g9_firmwareprobook_455_g7elite_tower_800_g9_firmwareproone_400_g2_20-inch_touch_all-in-oneelitebook_x360_830_g6probook_635_aero_g8_firmwareprodesk_405_g4_desktop_mini_firmwareelitebook_835_g9_firmwarepro_sff_400_g9probook_445_g6_firmwareprobook_445_g9proone_440_g6_24_all-in-one_firmwareprodesk_600_g3_desktop_miniz2_small_form_factor_g5_workstation_firmwareelitebook_645_g9_firmwareelitedesk_800_g6_small_form_factorz2_tower_g4_workstationelitedesk_800_65w_g3_desktop_mini_firmwarezbook_studio_g7elitebook_835_g8_firmwareeliteone_800_g4_23.8-in_all-in-one_businesselitedesk_800_g5_desktop_mini_firmwareproone_400_g6_20_all-in-onezbook_fury_15_g7_firmwarezbook_power_g8_firmwareeliteone_800_g3_23.8_non-touch_all-in-one_businessprobook_640_g8_firmwarezbook_14u_g5_firmwareprodesk_480_g6_microtowermt45_mobile_thin_client_firmwareeliteone_1000_g2_27-in_4k_uhd_all-in-one_businessz1_g9_towerprodesk_600_g2_small_form_factorelite_mini_600_g9elitebook_845_g7_firmwareprodesk_600_g4_small_form_factor_firmwarez2_mini_g5_workstationzhan_66_pro_a_14_g5elitebook_1040_g4probook_x360_11_g3_eeelitebook_735_g5eliteone_800_g3_23.8-inch_touch_all-in-oneelitebook_1040_g9_firmwareelitebook_735_g5_firmwareelitedesk_800_g8_desktop_miniprodesk_400_g6_desktop_mini_firmwareelitebook_846_g5_firmwareelite_mini_800_g9zbook_fury_17_g7proone_440_g5_23.8-in_all-in-one_businessprodesk_400_g6_microtower_firmwareprobook_fortis_g10elitebook_835_g7proone_400_g3_20-inch_touch_all-in-onezbook_14u_g6proone_400_g4_20-inch_non-touch_all-in-one_businesselitebook_755_g5zbook_15u_g6_firmwareelitedesk_800_g4_towerprobook_440_g8prodesk_400_g4_desktop_minielitebook_735_g6proone_400_g6_20_all-in-one_firmwareprobook_455_g9elitedesk_800_g2_small_form_factor_firmwareprobook_640_g5_firmwareprobook_440_g6proone_400_g5_23.8-inch_all-in-one_businessprobook_450_g6z1_g8_towerprobook_630_g8probook_650_g8probook_650_g4_firmwarezbook_firefly_15_g8_firmwareprobook_450_g9zhan_x_13_g2zbook_studio_g5proone_600_g2_21.5-inch_non-touch_all-in-oneelitebook_860_g9elitedesk_800_65w_g3_desktop_minieliteone_800_g4_23.8-inch_touch_gpu_all-in-oneelite_x360_830_g9_2-in-1eliteone_1000_g2_34-in_curved_all-in-one_businessprodesk_600_g5_desktop_mini_firmwareprobook_430_g8z2_mini_g4_workstation_firmwaremt44_mobile_thin_clientprodesk_680_g3_microtower_firmwareelitebook_x360_1040_g7elitebook_830_g9elite_x2_g4zbook_15_g5probook_455_g8prodesk_600_g4_microtower_firmwareelitebook_830_g8elitebook_840_g9_firmwareprodesk_400_g7_microtowerprodesk_600_g6_small_form_factor_firmwareelitedesk_800_g6_desktop_mini_firmwarezhan_66_pro_a_14_g4eliteone_1000_g2_23.8-in_touch_all-in-one_business_firmwareelitebook_x360_830_g8_firmwareeliteone_1000_g1_34-in_curved_all-in-one_business_firmwarezhan_66_pro_a_14_g3_firmwareprobook_445_g8_firmwarezhan_66_pro_14_g4elite_dragonfly_g3zhan_66_pro_g3_22_all-in-oneeliteone_800_g3_23.8-inch_touch_gpu_all-in-one_firmwareprobook_455_g5_firmwareprodesk_480_g5_microtower_firmwareengage_one_pro_aio_systemelitebook_830_g7elitebook_640_g9probook_455_g6_firmwareprodesk_600_g4_microtowerprodesk_405_g4_small_form_factormp9_g2_retail_system_firmwareelite_slicez2_mini_g4_workstationelitedesk_705_g4_workstation_firmwareprobook_440_g6_firmwareelitebook_x360_830_g6_firmwareelitebook_830_g6_firmwareelite_tower_680_g9elitedesk_800_65w_g4_desktop_mini_firmwarezhan_66_pro_g1_firmwareeliteone_800_g6_24_all-in-oneelite_x2_g4_firmwareeliteone_800_g4_23.8-inch_non-touch_all-in-one_firmwarezhan_66_pro_13_g2_firmwareelitebook_x360_830_g7_firmwareengage_go_10_mobile_system_firmwareelite_dragonfly_g3_firmwareelite_dragonfly_g2_firmwareprobook_x360_11_g7_eeelitebook_x360_1030_g3_firmwareelitebook_1030_g1elite_mini_800_g9_firmwareelitebook_645_g9zbook_firefly_16_g9_firmwareproone_400_g5_23.8-inch_all-in-one_business_firmwareelite_sff_600_g9elitedesk_705_g4_microtower_firmwarezhan_66_pro_15_g2_firmwarezhan_66_pro_14_g4_firmwarezbook_firefly_15_g7elitedesk_800_35w_g4_desktop_mini_firmwareproone_440_g6_24_all-in-onezbook_power_g9_firmwareelitebook_845_g8_firmwareprobook_640_g8elitebook_830_g9_firmwarezhan_66_pro_g1elitedesk_705_g4_microtowereliteone_800_g4_23.8-inch_non-touch_gpu_all-in-one_firmwarerp9_g1_retail_system_firmwareelitebook_840_g7elitebook_1050_g1elitedesk_800_g6_small_form_factor_firmwareengage_one_aio_system_firmwaredragonfly_folio_g3_2-in-1prodesk_400_g7_microtower_firmwareelitebook_850_g5zbook_power_g7elite_mini_600_g9_firmwareeliteone_1000_g1_23.8-in_touch_all-in-one_businesselitebook_630_g9elitebook_x360_1040_g6_firmwareelitebook_x360_1030_g4_firmwareprobook_x360_11_g3_ee_firmwarezhan_66_pro_14_g3_firmwareprodesk_400_g5_microtowerproone_600_g2_21.5-inch_touch_all-in-oneelite_folio_2-in-1_firmwareproone_600_g2_21.5-inch_touch_all-in-one_firmwarezhan_66_pro_a_14_g3elitedesk_800_35w_g3_desktop_mini_firmwarezbook_power_g8probook_440_g8_firmwareelitedesk_880_g5_tower_firmwareprodesk_600_g2_microtowerzbook_15_g6_firmwareelite_sff_800_g9elitedesk_880_g6_tower_firmwareeliteone_1000_g1_27-in_4k_uhd_all-in-one_businessprodesk_600_g4_desktop_minizbook_fury_16_g9proone_400_g3_20-inch_non-touch_all-in-onezbook_create_g7_firmwareproone_440_g4_23.8-inch_non-touch_all-in-one_businessprobook_fortis_g10_firmwareelitebook_840_g5mt46_mobile_thin_clientprobook_440_g5proone_440_23.8_inch_g9_all-in-oneprodesk_600_g2_microtower_firmwareeliteone_800_g6_27_all-in-oneproone_600_g5_21.5-in_all-in-one_businesszhan_66_pro_a_14_g4_firmwarezhan_66_pro_g3_24_all-in-one_firmwareelitebook_1050_g1_firmwareelitebook_755_g5_firmwareelitedesk_800_65w_g2_desktop_mini_firmwaredragonfly_folio_g3_2-in-1_firmwareprobook_640_g4probook_455_g9_firmwareproone_600_g3_21.5-inch_non-touch_all-in-oneprobook_445r_g6_firmwareelitedesk_800_95w_g4_desktop_mini_firmwareprodesk_400_g5_small_form_factor_firmwareprodesk_600_g3_small_form_factor_firmwareprodesk_600_g6_desktop_mini_firmwareprodesk_600_g6_firmwarezhan_66_pro_13_g2elite_dragonflyprobook_440_g5_firmwareprodesk_400_g6_small_form_factor_firmwareprodesk_600_g6_small_form_factorelite_dragonfly_maxeliteone_800_g3_23.8-inch_non-touch_all-in-one_firmwareproone_400_g3_20-inch_non-touch_all-in-one_firmwareelitedesk_800_g6_desktop_minizbook_14u_g6_firmwareprobook_445r_g6mt45_mobile_thin_clientprodesk_400_g6_small_form_factorzbook_15_g6eliteone_800_g8_27_all-in-onez2_small_form_factor_g4_workstation_firmwareelitebook_835_g7_firmwareelitebook_745_g5_firmwareelitebook_850_g6_firmwareelitebook_1040_g3probook_430_g8_firmwareprodesk_405_g6_small_form_factor_firmwareelitedesk_800_g5_towerprobook_fortis_g9_firmwareeliteone_800_g4_23.8-inch_touch_all-in-oneprodesk_405_g4_desktop_miniprobook_470_g5z1_g9_tower_firmwareelite_x2_1012_g1zbook_firefly_16_g9elitebook_840_g8probook_640_g4_firmwareelitebook_846_g5z2_small_form_factor_g8_workstation_firmwareprobook_455r_g6_firmwareproone_600_g4_21.5-inch_touch_all-in-one_business_firmwareelite_x360_1040_g9_2-in-1_firmwareelitedesk_800_g2_small_form_factorelitedesk_800_g6_towerengage_go_mobile_systemeliteone_1000_g2_34-in_curved_all-in-one_business_firmwarezbook_17_g5_firmwareproone_440_23.8_inch_g9_all-in-one_firmwareelitedesk_800_65w_g4_desktop_minielitebook_830_g5prodesk_480_g7_firmwareelitebook_640_g9_firmwareelitebook_x360_1040_g6elitebook_840_g6_firmwarezhan_66_pro_15_g2prodesk_400_g4_small_form_factormt44_mobile_thin_client_firmwareelitebook_735_g6_firmwareelitedesk_805_g6_desktop_minizbook_firefly_14_g7_firmwarez1_entry_tower_g6_workstationelitebook_745_g5probook_440_g9eliteone_800_g2_23-inch_touch_all-in-one_firmwareelitedesk_800_g4_workstationpro_x360_fortis_g9_firmwareelitebook_855_g8elitedesk_705_g4_desktop_mini_firmwareelitebook_1030_g1_firmwareelitedesk_805_g8_desktop_mini_firmwareelitedesk_800_g4_workstation_firmwareelitebook_745_g6_firmwareelite_sff_800_g9_firmwareelitedesk_800_g5_small_form_factor_firmwareelitedesk_880_g5_towerelitedesk_800_g4_small_form_factor_firmwareeliteone_800_g8_24_all-in-one_firmwareeliteone_800_g6_24_all-in-one_firmwareelitebook_836_g6_firmwareelitebook_x360_1030_g7probook_x360_11_g5_eeprobook_440_g9_firmwareelitebook_x360_1040_g7_firmwareprobook_x360_440_g1mp9_g2_retail_systemelitedesk_880_g4_towereliteone_800_g4_23.8-inch_non-touch_all-in-oneelitedesk_880_g8_tower_firmwareelite_tower_800_g9elitebook_x360_1040_g5prodesk_400_g3_desktop_mini_firmwareelitedesk_800_g3_tower_firmwareeliteone_800_g3_23.8-inch_non-touch_gpu_all-in-oneeliteone_840_23.8_inch_g9_all-in-one_firmwarezbook_fury_17_g8_firmwareelitebook_850_g8elitebook_835_g9elite_sff_600_g9_firmwareprodesk_680_g4_microtower_firmwareelitedesk_705_g4_desktop_minielitebook_x360_1030_g4eliteone_800_g6_27_all-in-one_firmwareprodesk_400_g3_desktop_minirp9_g1_retail_systemprodesk_680_g2_microtower_firmwareprobook_x360_440_g1_firmwareprodesk_680_g4_microtowerengage_one_aio_systemzbook_15_g5_firmwareeliteone_800_g2_23-inch_non-touch_all-in-one_firmwarez1_entry_tower_g6_workstation_firmwareprobook_455_g8_firmwareprobook_x360_435_g8probook_640_g7_firmwareelitedesk_805_g6_desktop_mini_firmwareelitebook_840_g6eliteone_800_g4_23.8-inch_touch_gpu_all-in-one_firmwareengage_flex_mini_retail_system_firmwareelitedesk_880_g3_tower_firmwareprobook_455_g6elitebook_850_g8_firmwareelite_x2_g8probook_x360_11_g4_eezbook_studio_g9_firmwareprobook_450_g8elitedesk_800_g3_towereliteone_800_g8_24_all-in-oneelitedesk_705_g5_small_form_factor_firmwarezbook_studio_g8_firmwareprodesk_600_g3_small_form_factorprodesk_480_g7prodesk_600_g5_microtowerelitebook_840_aero_g8_firmwareprodesk_680_g6elite_x2_1012_g2proone_400_g4_23.8-inch_non-touch_all-in-one_business_firmwareprobook_450_g9_firmwareeliteone_1000_g1_34-in_curved_all-in-one_businessprobook_445_g9_firmwareelitebook_840_g9prodesk_600_g5_desktop_miniprodesk_600_g2_small_form_factor_firmwareelitedesk_800_g8_small_form_factorprodesk_400_g7_small_form_factorzbook_studio_x360_g5zbook_15u_g6zbook_studio_x360_g5_firmwareproone_400_g6_24_all-in-oneprodesk_600_g5_small_form_factor_firmwareengage_go_10_mobile_systemprodesk_480_g4_microtowerelitedesk_800_35w_g3_desktop_minizbook_firefly_15_g8eliteone_1000_g2_27-in_4k_uhd_all-in-one_business_firmwareproone_400_g2_20-inch_non-touch_all-in-one_firmwareelite_dragonfly_max_firmwarepro_x360_fortis_g10_firmwareprobook_x360_435_g8_firmwarezbook_studio_g7_firmwarezbook_firefly_15_g7_firmwareeliteone_800_g4_23.8-in_all-in-one_business_firmwareengage_one_pro_aio_system_firmwareprodesk_400_g7_small_form_factor_firmwarezbook_15u_g5elitebook_855_g8_firmwareproone_400_g5_20-inch_all-in-one_business_firmwareeliteone_800_g5_23.8-in_all-in-oneelite_x2_1013_g3_firmwareprobook_x360_435_g7elitedesk_705_g5_desktop_minielitebook_830_g7_firmwareengage_go_mobile_system_firmwarepro_x360_fortis_g9elitebook_850_g6probook_450_g7prodesk_680_g6_firmwareproone_440_g5_23.8-in_all-in-one_business_firmwareproone_600_g6_22_all-in-onezhan_66_pro_a_14_g5_firmwareprobook_450_g7_firmwareeliteone_800_g2_23-inch_non-touch_all-in-onepro_mini_400_g9zbook_fury_15_g8_firmwareelitedesk_800_g8_towerelite_tower_680_g9_firmwareprobook_650_g4zbook_fury_16_g9_firmwareelitedesk_705_g5_small_form_factorprobook_650_g5z2_tower_g4_workstation_firmwareeliteone_1000_g1_23.8-in_all-in-one_business_firmwareelitedesk_800_g3_small_form_factorelitedesk_805_g6_small_form_factor_firmwareprodesk_405_g8_desktop_mini_firmwarezbook_create_g7zhan_66_pro_14_g2_firmwareprodesk_405_g8_small_form_factoreliteone_1000_g2_23.8-in_touch_all-in-one_businessprodesk_405_g8_desktop_minielitebook_745_g6elitebook_650_g9_firmwareprobook_430_g6eliteone_800_g5_23.8-inch_all-in-one_firmwareprodesk_480_g5_microtowerengage_flex_pro_retail_system_firmwareelitebook_1040_g9elitebook_x360_1030_g3zhan_66_pro_g5_firmwareprodesk_600_g5_microtower_firmwarezhan_66_pro_g3_22_all-in-one_firmwareprodesk_480_g4_microtower_firmwareprodesk_600_g6zhan_x_13_g2_firmwareelitedesk_880_g3_towerprodesk_600_g6_microtowerpro_mini_400_g9_firmwareprobook_455r_g6probook_430_g7elitebook_650_g9prodesk_405_g8_small_form_factor_firmwareprobook_450_g8_firmwarepro_sff_400_g9_firmwareelitebook_836_g5elitedesk_880_g4_tower_firmwareproone_600_g2_21.5-inch_non-touch_all-in-one_firmwareproone_400_g5_20-inch_all-in-one_businesselitebook_855_g7elitedesk_800_35w_g2_desktop_mini_firmwareprobook_x360_11_g7_ee_firmwareproone_400_g2_20-inch_non-touch_all-in-oneprodesk_400_g6_desktop_minielitedesk_800_g6_tower_firmwareelitedesk_880_g6_towerprobook_650_g7probook_455_g7_firmwareprodesk_405_g6_small_form_factorelite_dragonfly_firmwareproone_480_g3_20-inch_non-touch_all-in_oneelitebook_840_g8_firmwarepro_tower_480_g9_firmwareelitebook_850_g7zbook_firefly_14_g8elitebook_x360_1040_g5_firmwareprobook_430_g5probook_430_g7_firmwarezbook_power_g7_firmwareelitedesk_705_g5_desktop_mini_firmwareprobook_x360_11_g5_ee_firmwareprodesk_600_g3_microtower_firmwarezbook_firefly_14_g8_firmwareeliteone_800_g5_23.8-in_all-in-one_firmwareelite_slice_g2elitebook_845_g7elitebook_850_g7_firmwareelitebook_655_g9elitebook_1040_g4_firmwareelitebook_840_aero_g8probook_450_g5_firmwareelitedesk_800_35w_g4_desktop_miniprodesk_400_g4_small_form_factor_firmwareelite_x2_g8_firmwareelitedesk_800_g3_small_form_factor_firmwareeliteone_800_g8_27_all-in-one_firmwareproone_480_g3_20-inch_non-touch_all-in_one_firmwarezbook_14u_g5elitebook_x360_1030_g8_firmwarezbook_firefly_14_g9eliteone_1000_g1_23.8-in_touch_all-in-one_business_firmwaremp9_g4_retail_system_firmwareelitebook_840r_g4probook_645_g4elitedesk_800_g5_small_form_factorelite_slice_firmwareelitedesk_705_g4_workstationelitedesk_805_g8_desktop_miniz1_g8_tower_firmwareengage_flex_mini_retail_systemeliteone_800_g4_23.8-inch_touch_all-in-one_firmwarezbook_studio_g8elitebook_845_g9_firmwareprobook_635_aero_g8probook_440_g7_firmwareprodesk_600_g3_desktop_mini_firmwarezbook_15u_g5_firmwareproone_600_g6_22_all-in-one_firmwareelitebook_655_g9_firmwareelitedesk_805_g8_small_form_factor_firmwareengage_flex_pro_retail_systemelitebook_830_g5_firmwareelitebook_840r_g4_firmwarezhan_66_pro_g5eliteone_800_g2_23-inch_touch_all-in-onezbook_firefly_14_g9_firmwareproone_600_g4_21.5-inch_touch_all-in-one_businessprodesk_600_g4_desktop_mini_firmwareprobook_fortis_g9HP PC BIOS
CWE ID-CWE-863
Incorrect Authorization
CVE-2022-27836
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-8.4||HIGH
EPSS-0.01% / 1.13%
||
7 Day CHG~0.00%
Published-11 Apr, 2022 | 19:37
Updated-03 Aug, 2024 | 05:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control and path traversal vulnerability in Storage Manager and Storage Manager Service prior to SMR Apr-2022 Release 1 allow local attackers to access arbitrary system files without a proper permission. The patch adds proper validation logic to prevent arbitrary files access.

Action-Not Available
Vendor-Google LLCSamsung Electronics
Product-androidSamsung Mobile Devices
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE ID-CWE-863
Incorrect Authorization
CVE-2018-0338
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.8||HIGH
EPSS-0.10% / 27.83%
||
7 Day CHG~0.00%
Published-07 Jun, 2018 | 21:00
Updated-29 Nov, 2024 | 15:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the role-based access-checking mechanisms of Cisco Unified Computing System (UCS) Software could allow an authenticated, local attacker to execute arbitrary commands on an affected system. The vulnerability exists because the affected software lacks proper input and validation checks for certain file systems. An attacker could exploit this vulnerability by issuing crafted commands in the CLI of an affected system. A successful exploit could allow the attacker to cause other users to execute unwanted arbitrary commands on the affected system. Cisco Bug IDs: CSCvf52994.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-unified_computing_systemCisco Unified Computing System unknown
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-863
Incorrect Authorization
CVE-2018-0337
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.8||HIGH
EPSS-0.13% / 32.76%
||
7 Day CHG~0.00%
Published-21 Jun, 2018 | 11:00
Updated-29 Nov, 2024 | 14:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the role-based access-checking mechanisms of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on an affected device. The vulnerability exists because the affected software lacks proper input and validation checks for certain file systems. An attacker could exploit this vulnerability by issuing crafted commands in the CLI of an affected device. A successful exploit could allow the attacker to cause other users to execute unwanted, arbitrary commands on the affected device. Cisco Bug IDs: CSCvd06339, CSCvd15698, CSCvd36108, CSCvf52921, CSCvf52930, CSCvf52953, CSCvf52976.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-nexus_5548pnexus_5624qnexus_5548upnexus_56128pnexus_5648qnexus_5672upnexus_7000nx-osnexus_5010nexus_5000nexus_5696qnexus_5596upnexus_5020nexus_5596tnexus_7700Cisco NX-OS unknown
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-863
Incorrect Authorization
CVE-2022-22307
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.02% / 3.56%
||
7 Day CHG~0.00%
Published-15 Jun, 2023 | 00:35
Updated-12 Dec, 2024 | 21:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM Security Guardium privilege escalation

IBM Security Guardium 11.3, 11.4, and 11.5 could allow a local user to obtain elevated privileges due to incorrect authorization checks. IBM X-Force ID: 216753.

Action-Not Available
Vendor-IBM CorporationLinux Kernel Organization, Inc
Product-linux_kernelsecurity_guardiumSecurity Guardium
CWE ID-CWE-863
Incorrect Authorization
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • Next
Details not found