cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2020-5362,https://securityvulnerability.io/vulnerability/CVE-2020-5362,,"Dell Client Consumer and Commercial platforms include an improper authorization vulnerability in the Dell Manageability interface for which an unauthorized actor, with local system access with OS administrator privileges, could bypass the BIOS Administrator authentication to restore BIOS Setup configuration to default values.",Dell,Dell Client Consumer And Commercial Platforms,7.1,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2020-06-10T21:15:00.000Z,0 CVE-2020-5363,https://securityvulnerability.io/vulnerability/CVE-2020-5363,,"Select Dell Client Consumer and Commercial platforms include an issue that allows the BIOS Admin password to be changed through Dell's manageability interface without knowledge of the current BIOS Admin password. This could potentially allow an unauthorized actor, with physical access and/or OS administrator privileges to the device, to gain privileged access to the platform and the hard drive.",Dell,Dell Client Consumer And Commercial Platforms,8.6,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2020-06-10T21:15:00.000Z,0 CVE-2020-5326,https://securityvulnerability.io/vulnerability/CVE-2020-5326,,Affected Dell Client platforms contain a BIOS Setup configuration authentication bypass vulnerability in the pre-boot Intel Rapid Storage Response Technology (iRST) Manager menu. An attacker with physical access to the system could perform unauthorized changes to the BIOS Setup configuration settings without requiring the BIOS Admin password by selecting the Optimized Defaults option in the pre-boot iRST Manager.,Dell,Dell Client Consumer And Commercial Platforms,6.1,MEDIUM,0.0005799999926239252,false,,false,false,false,,,false,false,,2020-02-21T15:15:00.000Z,0 CVE-2020-5324,https://securityvulnerability.io/vulnerability/CVE-2020-5324,,"Dell Client Consumer and Commercial Platforms contain an Arbitrary File Overwrite Vulnerability. The vulnerability is limited to the Dell Firmware Update Utility during the time window while being executed by an administrator. During this time window, a locally authenticated low-privileged malicious user could exploit this vulnerability by tricking an administrator into overwriting arbitrary files via a symlink attack. The vulnerability does not affect the actual binary payload that the update utility delivers.",Dell,Dell Client Consumer And Commercial Platforms,7.1,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2020-02-21T15:15:00.000Z,0 CVE-2019-3717,https://securityvulnerability.io/vulnerability/CVE-2019-3717,,Select Dell Client Commercial and Consumer platforms contain an Improper Access Vulnerability. An unauthenticated attacker with physical access to the system could potentially bypass intended Secure Boot restrictions to run unsigned and untrusted code on expansion cards installed in the system during platform boot. Refer to https://www.dell.com/support/article/us/en/04/sln317683/dsa-2019-043-dell-client-improper-access-control-vulnerability?lang=en for versions affected by this vulnerability.,Dell,Dell Client Commercial And Consumer Platforms,7.1,HIGH,0.0006900000153109431,false,,false,false,false,,,false,false,,2019-08-05T17:15:00.000Z,0