{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-39584","assignerOrgId":"c550e75a-17ff-4988-97f0-544cde3820fe","state":"PUBLISHED","assignerShortName":"dell","dateReserved":"2024-06-26T02:16:08.993Z","datePublished":"2024-08-28T05:46:40.013Z","dateUpdated":"2024-08-28T14:15:01.978Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Dell Client Platform BIOS","vendor":"Dell","versions":[{"lessThan":"1.29.0","status":"affected","version":"N/A","versionType":"semver"},{"lessThan":"1.15.0","status":"affected","version":"N/A","versionType":"semver"},{"lessThan":"1.21.0","status":"affected","version":"N/A","versionType":"semver"},{"lessThan":"1.24.0","status":"affected","version":"N/A","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","value":"CVE-2024-39584: Dell Technologies would like to thank BINARLY REsearch team for reporting this issue."}],"datePublic":"2024-08-27T06:30:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Dell Client Platform BIOS contains a Use of Default Cryptographic Key Vulnerability.  A high privileged attacker with local access could potentially exploit this vulnerability, leading to Secure Boot bypass and arbitrary code execution."}],"value":"Dell Client Platform BIOS contains a Use of Default Cryptographic Key Vulnerability.  A high privileged attacker with local access could potentially exploit this vulnerability, leading to Secure Boot bypass and arbitrary code execution."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":8.2,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-1392","description":"CWE-1392: Use of Default Credentials","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"c550e75a-17ff-4988-97f0-544cde3820fe","shortName":"dell","dateUpdated":"2024-08-28T05:46:40.013Z"},"references":[{"tags":["vendor-advisory"],"url":"https://www.dell.com/support/kbdoc/en-us/000227594/dsa-2024-354"}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"affected":[{"vendor":"dell","product":"alienware_m17_r3_firmware","cpes":["cpe:2.3:o:dell:alienware_area_51m_r2_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:dell:alienware_m15_r3_firmware:-:*:*:*:*:*:*:*","cpe:2.3:o:dell:alienware_m17_r3_firmware:-:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","versions":[{"version":"0","status":"affected","lessThan":"1.29.0","versionType":"semver"}]},{"vendor":"dell","product":"alienware_aurora_r15_amd_firmware","cpes":["cpe:2.3:o:dell:alienware_aurora_r15_amd_firmware:*:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","versions":[{"version":"0","status":"affected","lessThan":"1.15.0","versionType":"semver"}]},{"vendor":"dell","product":"alienware_x14_firmware","cpes":["cpe:2.3:o:dell:alienware_x14_firmware:-:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","versions":[{"version":"0","status":"affected","lessThan":"1.21.0","versionType":"semver"}]},{"vendor":"dell","product":"alienware_x15_r1_firmware","cpes":["cpe:2.3:o:dell:alienware_x17_r1_firmware:*:*:*:*:*:*:*:*","cpe:2.3:o:dell:alienware_x15_r1_firmware:*:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","versions":[{"version":"0","status":"affected","lessThan":"1.24.0","versionType":"semver"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-08-28T14:02:49.780082Z","id":"CVE-2024-39584","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-08-28T14:15:01.978Z"}}]}}