CVE-2023-28073

8.2 HIGH

📋 TL;DR

Dell BIOS contains an authentication bypass vulnerability that allows a local attacker with physical or administrative access to bypass security controls and gain elevated system privileges. This affects Dell client systems with vulnerable BIOS versions.

💻 Affected Systems

Products:
  • Dell client systems (laptops, desktops, workstations)
Versions: Specific BIOS versions listed in Dell advisory DSA-2023-160
Operating Systems: All operating systems running on affected Dell hardware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local access to the system. Affects multiple Dell client platforms with specific BIOS versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains full system control, installs persistent malware, bypasses disk encryption, and compromises the entire system including firmware.

🟠

Likely Case

Local attacker with physical or administrative access elevates privileges to install malware, extract sensitive data, or bypass security controls.

🟢

If Mitigated

With proper physical security and administrative controls, risk is limited to authorized users who might abuse their access.

🌐 Internet-Facing: LOW - Requires local access to the system, not remotely exploitable over network.
🏢 Internal Only: HIGH - Local attackers with physical or administrative access can exploit this to gain full system control.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires local authenticated access. Exploitation likely involves BIOS/UEFI interface manipulation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: BIOS updates specified in Dell advisory DSA-2023-160

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000213032/dsa-2023-160-dell-client

Restart Required: Yes

Instructions:

1. Identify your Dell system model and current BIOS version. 2. Visit Dell support site and download the BIOS update for your specific model. 3. Run the BIOS update executable with administrative privileges. 4. Restart the system when prompted to complete the update.

🔧 Temporary Workarounds

Physical Security Controls

all

Restrict physical access to vulnerable systems to prevent local exploitation.

BIOS Password Protection

all

Enable BIOS/UEFI password to add an additional authentication layer.

🧯 If You Can't Patch

  • Implement strict physical security controls and limit administrative access
  • Enable BitLocker/disk encryption and secure boot to add protection layers

🔍 How to Verify

Check if Vulnerable:

Check BIOS version against affected versions in Dell advisory DSA-2023-160. On Windows: Run 'wmic bios get smbiosbiosversion'. On Linux: Run 'sudo dmidecode -s bios-version'.

Check Version:

Windows: wmic bios get smbiosbiosversion | Linux: sudo dmidecode -s bios-version

Verify Fix Applied:

Verify BIOS version has been updated to a version not listed in the advisory. Check that BIOS/UEFI authentication mechanisms are functioning properly.

📡 Detection & Monitoring

Log Indicators:

  • BIOS/UEFI configuration changes
  • Failed authentication attempts at BIOS level
  • Unexpected system restarts or firmware updates

Network Indicators:

  • No network indicators - local exploit only

SIEM Query:

Search for BIOS/UEFI related events, unexpected system restarts, or firmware modification attempts in system logs.

🔗 References

📤 Share & Export