CVE-2023-32475

7.6 HIGH

📋 TL;DR

Dell BIOS contains a missing integrity check vulnerability that allows attackers with physical access to bypass security mechanisms and execute arbitrary code. This affects Dell systems with vulnerable BIOS versions, primarily those with AMD processors. Physical access is required for exploitation.

💻 Affected Systems

Products:
  • Dell systems with AMD processors
Versions: Specific BIOS versions listed in Dell advisory DSA-2023-222
Operating Systems: All operating systems running on affected hardware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with specific Dell BIOS versions on AMD platforms. Check Dell advisory for exact models.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains full system control, installs persistent malware, steals sensitive data, and bypasses all security controls including disk encryption.

🟠

Likely Case

Attacker with physical access installs bootkits or firmware-level malware that persists across OS reinstalls and evades detection.

🟢

If Mitigated

With proper physical security controls, the risk is significantly reduced as physical access is required for exploitation.

🌐 Internet-Facing: LOW - Physical access required, cannot be exploited remotely.
🏢 Internal Only: MEDIUM - Physical access requirement reduces risk, but insider threats or physical breaches could exploit this.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires physical access and BIOS/UEFI manipulation knowledge. No public exploits known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: BIOS updates specified in Dell advisory DSA-2023-222

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000215644/dsa-2023-222-security-update-for-an-amd-bios-vulnerability

Restart Required: Yes

Instructions:

1. Identify your Dell system model and current BIOS version. 2. Visit Dell Support website. 3. Download the BIOS update for your specific model. 4. Run the update executable with administrator privileges. 5. Restart the system when prompted.

🔧 Temporary Workarounds

Enhanced Physical Security

all

Implement strict physical access controls to prevent unauthorized physical access to systems.

BIOS Password Protection

all

Set strong BIOS/UEFI passwords to prevent unauthorized BIOS modifications.

🧯 If You Can't Patch

  • Implement strict physical security controls and monitoring for affected systems
  • Consider retiring or replacing systems that cannot be patched

🔍 How to Verify

Check if Vulnerable:

Check BIOS version in system settings or using 'wmic bios get smbiosbiosversion' on Windows or 'dmidecode -s bios-version' on Linux, then compare with Dell advisory.

Check Version:

Windows: wmic bios get smbiosbiosversion | Linux: dmidecode -s bios-version

Verify Fix Applied:

Verify BIOS version after update matches patched version in Dell advisory.

📡 Detection & Monitoring

Log Indicators:

  • BIOS/UEFI modification events in system logs
  • Unexpected system restarts or boot sequence changes

Network Indicators:

  • No network indicators - physical access required

SIEM Query:

Search for BIOS/UEFI firmware modification events or unexpected secure boot violations

🔗 References

📤 Share & Export