Description
Dell Client Platform BIOS contains a Weak Password Recovery Mechanism vulnerability. An unauthenticated attacker with physical access to the system could potentially exploit this vulnerability, leading to unauthorized access.
Published: 2026-04-16
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Access via Weak Password Recovery in BIOS
Action: Update Firmware
AI Analysis

Impact

Dell Client Platform BIOS includes a weak password recovery mechanism that allows an unauthenticated attacker who has physical access to the system to bypass security controls and gain unauthorized access to the machine. The vulnerability stems from inadequate protection of credential recovery routines, enabling the attacker to retrieve or reset the BIOS password without proper authentication, as identified by CWE‑640.

Affected Systems

The affected systems are Dell client devices spanning numerous lines including all Dell Alienware laptops (Area‑51, Aurora, X16, M18, etc.), ChengMing reference servers (3900/3910/3911/3990/3991), Dell G series laptops (G15, G16, G5 5000), Dell Pro laptops and towers (Pro 13, Pro 14, Pro 15, Pro 16, Pro 24, Pro Max, Pro Rugged, Pro Slim, Pro Tower) and Dell limited‑series models (Dells 14‑16 Premium, 15‑16 DC, 16‑Premium DA, 16‑DC, 16‑Premium, 16‑DC 2, 16‑Premium DA, 16‑DC 2, etc.). This encompasses both desktop and laptop configurations using the Dell Client Platform BIOS.

Risk and Exploitability

With a CVSS score of 5.1, the vulnerability presents a medium severity risk. The EPSS score is not available, and the vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog, indicating a lower probability of widespread exploitation yet still significant due to the requirement of physical access. The attack vector is local, requiring an attacker to be physically present to trigger the password recovery exploitation. Once exploited, the attacker can gain privileged access to boot‑time settings and potentially all data stored on the device, thereby impacting confidentiality and integrity of the system. Regular audits and safeguards should be considered to limit potential impact until a firmware fix is applied.

Generated by OpenCVE AI on April 17, 2026 at 03:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest BIOS firmware update for each affected Dell product via the Dell support portal (see https://www.dell.com/support/kbdoc/en-us/000300450/dsa-2025-153).
  • If a firmware update is not yet available, disable the BIOS password recovery feature or enforce a strong password policy to mitigate the risk of unauthorized recovery.
  • Restrict physical access to affected systems through environmental controls, ensuring that only authorized personnel can operate or service them.

Generated by OpenCVE AI on April 17, 2026 at 03:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 17 Apr 2026 03:45:00 +0000

Type Values Removed Values Added
Title Weak Password Recovery Mechanism in Dell Client Platform BIOS Allows Physical Access Attack

Thu, 16 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 16 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description Dell Client Platform BIOS contains a Weak Password Recovery Mechanism vulnerability. An unauthenticated attacker with physical access to the system could potentially exploit this vulnerability, leading to unauthorized access.
Weaknesses CWE-640
References
Metrics cvssV3_1

{'score': 5.1, 'vector': 'CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: dell

Published:

Updated: 2026-04-16T18:32:52.672Z

Reserved: 2025-04-15T21:30:44.885Z

Link: CVE-2025-36579

cve-icon Vulnrichment

Updated: 2026-04-16T17:16:21.652Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-16T17:16:54.073

Modified: 2026-04-17T15:14:05.510

Link: CVE-2025-36579

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T03:30:08Z

Weaknesses