Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2020-5363
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Select Dell Client Consumer and Commercial platforms include an issue that allows the BIOS Admin password to be changed through Dell's manageability interface without knowledge of the current BIOS Admin password. This could potentially allow an unauthorized actor, with physical access and/or OS administrator privileges to the device, to gain privileged access to the platform and the hard drive.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
空字节或NULL字符转义处理不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
多款Dell产品安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Dell Latitude 5300等都是美国戴尔(Dell)公司的一款笔记本电脑。 多款Dell产品中存在安全漏洞。攻击者可利用该漏洞无需当前BIOS Admin密码便可修改BIOS Admin密码,获取该平台及硬盘驱动器较高的访问权限。以下产品及版本受到影响:Dell Latitude 5300;Latitude 5300 2-IN-1;Latitude 5400;Latitude 5401;Latitude 5500;Latitude 5501;Latitude 7200 2 in 1;Latitu
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
DellDell Client Consumer and Commercial platforms https://www.dell.com/support/article/SLN321604 -
II. Public POCs for CVE-2020-5363
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2020-5363
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2020-5363

No comments yet


Leave a comment