CVE-2024-28970

4.7 MEDIUM

📋 TL;DR

Dell Client BIOS contains an out-of-bounds write vulnerability that allows a local authenticated malicious user with admin privileges to potentially cause platform denial of service. This affects Dell client systems with vulnerable BIOS versions.

💻 Affected Systems

Products:
  • Dell Client BIOS
Versions: Specific versions not detailed in advisory; check Dell DSA-2024-168 for affected models/versions
Operating Systems: Windows, Linux, All supported OS on affected Dell systems
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local authenticated access with administrative privileges. Affects various Dell client system models listed in DSA-2024-168.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system crash or bricking requiring physical hardware intervention to restore functionality.

🟠

Likely Case

Temporary denial of service requiring system reboot to restore normal operation.

🟢

If Mitigated

Minimal impact if proper access controls prevent unauthorized local admin access.

🌐 Internet-Facing: LOW - Requires local authenticated access with admin privileges, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Insider threat scenario where malicious user with local admin access could disrupt systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local authenticated admin access and specific knowledge of BIOS exploitation techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: BIOS updates specified in DSA-2024-168 for affected models

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000225476/dsa-2024-168

Restart Required: Yes

Instructions:

1. Identify your Dell system model. 2. Visit Dell Support website. 3. Download latest BIOS update for your model from DSA-2024-168. 4. Run BIOS update executable. 5. Restart system when prompted.

🔧 Temporary Workarounds

Restrict Local Admin Access

all

Limit number of users with local administrative privileges to reduce attack surface.

Physical Security Controls

all

Implement physical security measures to prevent unauthorized physical access to systems.

🧯 If You Can't Patch

  • Implement strict least privilege access controls for local administrative accounts
  • Monitor for unusual system crashes or BIOS-related events on Dell systems

🔍 How to Verify

Check if Vulnerable:

Check Dell Support site with your system service tag or check current BIOS version against affected versions in DSA-2024-168

Check Version:

Windows: wmic bios get smbiosbiosversion | Linux: sudo dmidecode -s bios-version

Verify Fix Applied:

Verify BIOS version has been updated to patched version listed in DSA-2024-168 for your specific model

📡 Detection & Monitoring

Log Indicators:

  • Unexpected system crashes
  • BIOS update failures
  • Unauthorized BIOS modification attempts

Network Indicators:

  • None - local exploitation only

SIEM Query:

EventID 6008 (Unexpected shutdown) on Windows systems combined with Dell BIOS version checks

🔗 References

📤 Share & Export