SB20250520110 - Multiple vulnerabilities in Dell Integrated System



SB20250520110 - Multiple vulnerabilities in Dell Integrated System

Published: May 20, 2025

Security Bulletin ID SB20250520110
Severity
Medium
Patch available
YES
Number of vulnerabilities 11
Exploitation vector Adjecent network
Highest impact Code execution

Breakdown by Severity

Medium 9% Low 91%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 11 secuirty vulnerabilities.


1) Buffer overflow (CVE-ID: CVE-2024-31155)

The vulnerability allows a local user to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the UEFI firmware. A local administrator can trigger memory corruption and execute arbitrary code on the target system with elevated privileges.


2) Buffer overflow (CVE-ID: CVE-2024-21859)

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to a boundary error in the UEFI firmware. A local administrator can trigger memory corruption and gain unauthorized access to sensitive information on the system.


3) Input validation error (CVE-ID: CVE-2024-39279)

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient granularity of access control. A local user can pass specially crafted input to the application and perform a denial of service (DoS) attack.


4) Improper Initialization (CVE-ID: CVE-2024-31157)

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to improper initialization in OutOfBandXML module. A local user can gain unauthorized access to sensitive information on the system.


5) Input validation error (CVE-ID: CVE-2024-28047)

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to insufficient validation of user-supplied input. A local administrator can gain unauthorized access to sensitive information on the system.


6) Improper access control (CVE-ID: CVE-2024-36293)

The vulnerability allows a local user to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions in the EDECCSSA user leaf function. A local user can bypass implemented security restrictions and perform a denial of service (DoS) attack.


7) Input validation error (CVE-ID: CVE-2024-31068)

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper Finite State Machines (FSMs) in Hardware Logic. A local administrator can pass specially crafted input to the application and perform a denial of service (DoS) attack.


8) Untrusted search path (CVE-ID: CVE-2024-24852)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to usage of an untrusted search path. A local user can execute arbitrary code with escalated privileges.


9) Out-of-bounds write (CVE-ID: CVE-2024-36274)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing untrusted input in the Intel 800 Series Ethernet Driver. A remote attacker on the local network can trigger an out-of-bounds write and perform a denial of service (DoS) attack.


10) Input validation error (CVE-ID: CVE-2024-25571)

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input. A local administrator can pass specially crafted input to the application and perform a denial of service (DoS) attack.


11) Sequence of processor instructions leads to unexpected behavior (CVE-ID: CVE-2024-37020)

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an error related to processing of Sequence of processor instructions. A local user can cause a denial of service condition on the target system.


Remediation

Install update from vendor's website.