Impact
Dell Client Platform BIOS includes a weak password recovery mechanism that allows an unauthenticated attacker who has physical access to the system to bypass security controls and gain unauthorized access to the machine. The vulnerability stems from inadequate protection of credential recovery routines, enabling the attacker to retrieve or reset the BIOS password without proper authentication, as identified by CWE‑640.
Affected Systems
The affected systems are Dell client devices spanning numerous lines including all Dell Alienware laptops (Area‑51, Aurora, X16, M18, etc.), ChengMing reference servers (3900/3910/3911/3990/3991), Dell G series laptops (G15, G16, G5 5000), Dell Pro laptops and towers (Pro 13, Pro 14, Pro 15, Pro 16, Pro 24, Pro Max, Pro Rugged, Pro Slim, Pro Tower) and Dell limited‑series models (Dells 14‑16 Premium, 15‑16 DC, 16‑Premium DA, 16‑DC, 16‑Premium, 16‑DC 2, 16‑Premium DA, 16‑DC 2, etc.). This encompasses both desktop and laptop configurations using the Dell Client Platform BIOS.
Risk and Exploitability
With a CVSS score of 5.1, the vulnerability presents a medium severity risk. The EPSS score is not available, and the vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog, indicating a lower probability of widespread exploitation yet still significant due to the requirement of physical access. The attack vector is local, requiring an attacker to be physically present to trigger the password recovery exploitation. Once exploited, the attacker can gain privileged access to boot‑time settings and potentially all data stored on the device, thereby impacting confidentiality and integrity of the system. Regular audits and safeguards should be considered to limit potential impact until a firmware fix is applied.
OpenCVE Enrichment