CVE-2020-5361

Select Dell Client Commercial and Consumer platforms support a BIOS password reset capability that is designed to assist authorized customers who forget their passwords. Dell is aware of unauthorized password generation tools that can generate BIOS recovery passwords. The tools, which are not authorized by Dell, can be used by a physically present attacker to reset BIOS passwords and BIOS-managed Hard Disk Drive (HDD) passwords. An unauthenticated attacker with physical access to the system could potentially exploit this vulnerability to bypass security restrictions for BIOS Setup configuration, HDD access and BIOS pre-boot authentication.
Configurations

Configuration 1 (hide)

cpe:2.3:o:dell:cpg_bios:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:33

Type Values Removed Values Added
References () https://www.dell.com/support/kbdoc/en-us/000180741/dsa-2020-119-dell-client-products-unauthorized-bios-password-reset-tool-vulnerability - Vendor Advisory () https://www.dell.com/support/kbdoc/en-us/000180741/dsa-2020-119-dell-client-products-unauthorized-bios-password-reset-tool-vulnerability - Vendor Advisory
CVSS v2 : 7.2
v3 : 7.6
v2 : 7.2
v3 : 5.1

Information

Published : 2021-01-04 22:15

Updated : 2024-11-21 05:33


NVD link : CVE-2020-5361

Mitre link : CVE-2020-5361

CVE.ORG link : CVE-2020-5361


JSON object : View

Products Affected

dell

  • cpg_bios
CWE
CWE-640

Weak Password Recovery Mechanism for Forgotten Password