Dell is releasing remediations for multiple security vulnerabilities affecting the BIOSConnect and HTTPS Boot features.
- The Dell BIOSConnect feature is a Dell preboot solution that is used to update system BIOS and recover the operating system (OS) using the SupportAssist OS Recovery on Dell Client platforms. Note: BIOSConnect requires a physically present user to initiate this feature.
- The Dell HTTPS Boot feature is an extension to UEFI HTTP Boot specifications to boot from an HTTP(S) Server. Note: This feature is not configured by default and requires a physically present user with local OS admin rights to configure. Additionally, a physically present user is required to initiate the feature when used with wireless networks.
Proprietary Code CVEs | Description | CVSS Base Score | CVSS Vector String |
CVE-2021-21571 | Dell UEFI BIOS https stack leveraged by the Dell BIOSConnect feature and Dell HTTPS Boot feature contains an improper certificate validation vulnerability. A remote unauthenticated attacker may exploit this vulnerability using a person-in-the-middle attack which may lead to a denial of service and payload tampering. | 5.9 | CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H |
CVE-2021-21572, CVE-2021-21573, CVE-2021-21574 |
Dell BIOSConnect feature contains a buffer overflow vulnerability. An authenticated malicious admin user with local access to the system may potentially exploit this vulnerability to run arbitrary code and bypass UEFI restrictions. | 7.2 | CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H |
Exploiting the chain requires additional steps:
- To exploit the vulnerability chain in BIOSConnect, a malicious actor must separately perform additional steps before a successful exploit, including: compromise a user’s network, obtain a certificate that is trusted by one of the Dell UEFI BIOS https stack’s built-in Certificate Authorities, and wait for a user who is physically present at the system to use the BIOSConnect feature.
- To exploit the vulnerability in HTTPS Boot, a malicious actor must separately perform additional steps before a successful exploit, including: compromise a user’s network, obtain a certificate that is trusted by one of the Dell UEFI BIOS https stack’s built-in Certificate Authorities, and wait for a user who is physically present at the system to change the boot order and use the HTTPS Boot feature.
Affected Products:
Product | BIOS Update Version (or greater) |
Supports BIOSConnect | Supports HTTP(s) Boot | Release Date (MM/DD/YYYY) Expected Release (Month /YYYY) |
Alienware m15 R6 | 1.3.3 | Yes | Yes | 6/21/2021 |
ChengMing 3990 | 1.4.1 | Yes | No | 6/23/2021 |
ChengMing 3991 | 1.4.1 | Yes | No | 6/23/2021 |
Dell G15 5510 | 1.4.0 | Yes | Yes | 6/21/2021 |
Dell G15 5511 | 1.3.3 | Yes | Yes | 6/21/2021 |
Dell G3 3500 | 1.9.0 | Yes | No | 6/24/2021 |
Dell G5 5500 | 1.9.0 | Yes | No | 6/24/2021 |
Dell G7 7500 | 1.9.0 | Yes | No | 6/23/2021 |
Dell G7 7700 | 1.9.0 | Yes | No | 6/23/2021 |
Inspiron 14 5418 | 2.1.0 A06 | Yes | Yes | 6/24/2021 |
Inspiron 15 5518 | 2.1.0 A06 | Yes | Yes | 6/24/2021 |
Inspiron 15 7510 | 1.0.4 | Yes | Yes | 6/23/2021 |
Inspiron 3501 | 1.6.0 | Yes | No | 6/23/2021 |
Inspiron 3880 | 1.4.1 | Yes | No | 6/23/2021 |
Inspiron 3881 | 1.4.1 | Yes | No | 6/23/2021 |
Inspiron 3891 | 1.0.11 | Yes | Yes | 6/24/2021 |
Inspiron 5300 | 1.7.1 | Yes | No | 6/23/2021 |
Inspiron 5301 | 1.8.1 | Yes | No | 6/23/2021 |
Inspiron 5310 | 2.1.0 | Yes | Yes | 6/23/2021 |
Inspiron 5400 2n1 | 1.7.0 | Yes | No | 6/23/2021 |
Inspiron 5400 AIO | 1.4.0 | Yes | No | 6/23/2021 |
Inspiron 5401 | 1.7.2 | Yes | No | 6/23/2021 |
Inspiron 5401 AIO | 1.4.0 | Yes | No | 6/23/2021 |
Inspiron 5402 | 1.5.1 | Yes | No | 6/23/2021 |
Inspiron 5406 2n1 | 1.5.1 | Yes | No | 6/23/2021 |
Inspiron 5408 | 1.7.2 | Yes | No | 6/23/2021 |
Inspiron 5409 | 1.5.1 | Yes | No | 6/23/2021 |
Inspiron 5410 2-in-1 | 2.1.0 | Yes | Yes | 6/23/2021 |
Inspiron 5501 | 1.7.2 | Yes | No | 6/23/2021 |
Inspiron 5502 | 1.5.1 | Yes | No | 6/23/2021 |
Inspiron 5508 | 1.7.2 | Yes | No | 6/23/2021 |
Inspiron 5509 | 1.5.1 | Yes | No | 6/23/2021 |
Inspiron 7300 | 1.8.1 | Yes | No | 6/23/2021 |
Inspiron 7300 2n1 | 1.3.0 | Yes | No | 6/23/2021 |
Inspiron 7306 2n1 | 1.5.1 | Yes | No | 6/23/2021 |
Inspiron 7400 | 1.8.1 | Yes | No | 6/23/2021 |
Inspiron 7500 | 1.8.0 | Yes | No | 6/23/2021 |
Inspiron 7500 2n1 – Black | 1.3.0 | Yes | No | 6/23/2021 |
Inspiron 7500 2n1 – Silver | 1.3.0 | Yes | No | 6/23/2021 |
Inspiron 7501 | 1.8.0 | Yes | No | 6/23/2021 |
Inspiron 7506 2n1 | 1.5.1 | Yes | No | 6/23/2021 |
Inspiron 7610 | 1.0.4 | Yes | Yes | 6/23/2021 |
Inspiron 7700 AIO | 1.4.0 | Yes | No | 6/23/2021 |
Inspiron 7706 2n1 | 1.5.1 | Yes | No | 6/23/2021 |
Latitude 3120 | 1.1.0 | Yes | No | 6/23/2021 |
Latitude 3320 | 1.4.0 | Yes | Yes | 6/23/2021 |
Latitude 3410 | 1.9.0 | Yes | No | 6/23/2021 |
Latitude 3420 | 1.8.0 | Yes | No | 6/23/2021 |
Latitude 3510 | 1.9.0 | Yes | No | 6/23/2021 |
Latitude 3520 | 1.8.0 | Yes | No | 6/23/2021 |
Latitude 5310 | 1.7.0 | Yes | No | 6/24/2021 |
Latitude 5310 2 in 1 | 1.7.0 | Yes | No | 6/24/2021 |
Latitude 5320 | 1.7.1 | Yes | Yes | 6/21/2021 |
Latitude 5320 2-in-1 | 1.7.1 | Yes | Yes | 6/21/2021 |
Latitude 5410 | 1.6.0 | Yes | No | 6/23/2021 |
Latitude 5411 | 1.6.0 | Yes | No | 6/23/2021 |
Latitude 5420 | 1.8.0 | Yes | Yes | 6/22/2021 |
Latitude 5510 | 1.6.0 | Yes | No | 6/23/2021 |
Latitude 5511 | 1.6.0 | Yes | No | 6/23/2021 |
Latitude 5520 | 1.7.1 | Yes | Yes | 6/21/2021 |
Latitude 5521 | 1.3.0 A03 | Yes | Yes | 6/22/2021 |
Latitude 7210 2-in-1 | 1.7.0 | Yes | No | 6/23/2021 |
Latitude 7310 | 1.7.0 | Yes | No | 6/23/2021 |
Latitude 7320 | 1.7.1 | Yes | Yes | 6/23/2021 |
Latitude 7320 Detachable | 1.4.0 A04 | Yes | Yes | 6/22/2021 |
Latitude 7410 | 1.7.0 | Yes | No | 6/23/2021 |
Latitude 7420 | 1.7.1 | Yes | Yes | 6/23/2021 |
Latitude 7520 | 1.7.1 | Yes | Yes | 6/23/2021 |
Latitude 9410 | 1.7.0 | Yes | No | 6/23/2021 |
Latitude 9420 | 1.4.1 | Yes | Yes | 6/23/2021 |
Latitude 9510 | 1.6.0 | Yes | No | 6/23/2021 |
Latitude 9520 | 1.5.2 | Yes | Yes | 6/23/2021 |
Latitude 5421 | 1.3.0 A03 | Yes | Yes | 6/22/2021 |
OptiPlex 3080 | 2.1.1 | Yes | No | 6/23/2021 |
OptiPlex 3090 UFF | 1.2.0 | Yes | Yes | 6/23/2021 |
OptiPlex 3280 All-in-One | 1.7.0 | Yes | No | 6/23/2021 |
OptiPlex 5080 | 1.4.0 | Yes | No | 6/23/2021 |
OptiPlex 5090 Tower | 1.1.35 | Yes | Yes | 6/23/2021 |
OptiPlex 5490 AIO | 1.3.0 | Yes | Yes | 6/24/2021 |
OptiPlex 7080 | 1.4.0 | Yes | No | 6/23/2021 |
OptiPlex 7090 Tower | 1.1.35 | Yes | Yes | 6/23/2021 |
OptiPlex 7090 UFF | 1.2.0 | Yes | Yes | 6/23/2021 |
OptiPlex 7480 All-in-One | 1.7.0 | Yes | No | 6/23/2021 |
OptiPlex 7490 All-in-One | 1.3.0 | Yes | Yes | 6/24/2021 |
OptiPlex 7780 All-in-One | 1.7.0 | Yes | No | 6/23/2021 |
Precision 17 M5750 | 1.8.2 | Yes | No | 6/9/2021 |
Precision 3440 | 1.4.0 | Yes | No | 6/23/2021 |
Precision 3450 | 1.1.35 | Yes | Yes | 6/24/2021 |
Precision 3550 | 1.6.0 | Yes | No | 6/23/2021 |
Precision 3551 | 1.6.0 | Yes | No | 6/23/2021 |
Precision 3560 | 1.7.1 | Yes | Yes | 6/21/2021 |
Precision 3561 | 1.3.0 A03 | Yes | Yes | 6/22/2021 |
Precision 3640 | 1.6.2 | Yes | No | 6/23/2021 |
Precision 3650 MT | 1.2.0 | Yes | Yes | 6/24/2021 |
Precision 5550 | 1.8.1 | Yes | No | 6/23/2021 |
Precision 5560 | 1.3.2 | Yes | Yes | 6/23/2021 |
Precision 5760 | 1.1.3 | Yes | Yes | 6/16/2021 |
Precision 7550 | 1.8.0 | Yes | No | 6/23/2021 |
Precision 7560 | 1.1.2 | Yes | Yes | 6/22/2021 |
Precision 7750 | 1.8.0 | Yes | No | 6/23/2021 |
Precision 7760 | 1.1.2 | Yes | Yes | 6/22/2021 |
Vostro 14 5410 | 2.1.0 A06 | Yes | Yes | 6/24/2021 |
Vostro 15 5510 | 2.1.0 A06 | Yes | Yes | 6/24/2021 |
Vostro 15 7510 | 1.0.4 | Yes | Yes | 6/23/2021 |
Vostro 3400 | 1.6.0 | Yes | No | 6/23/2021 |
Vostro 3500 | 1.6.0 | Yes | No | 6/23/2021 |
Vostro 3501 | 1.6.0 | Yes | No | 6/23/2021 |
Vostro 3681 | 2.4.0 | Yes | No | 6/23/2021 |
Vostro 3690 | 1.0.11 | Yes | Yes | 6/24/2021 |
Vostro 3881 | 2.4.0 | Yes | No | 6/23/2021 |
Vostro 3888 | 2.4.0 | Yes | No | 6/23/2021 |
Vostro 3890 | 1.0.11 | Yes | Yes | 6/24/2021 |
Vostro 5300 | 1.7.1 | Yes | No | 6/23/2021 |
Vostro 5301 | 1.8.1 | Yes | No | 6/23/2021 |
Vostro 5310 | 2.1.0 | Yes | Yes | 6/23/2021 |
Vostro 5401 | 1.7.2 | Yes | No | 6/23/2021 |
Vostro 5402 | 1.5.1 | Yes | No | 6/23/2021 |
Vostro 5501 | 1.7.2 | Yes | No | 6/23/2021 |
Vostro 5502 | 1.5.1 | Yes | No | 6/23/2021 |
Vostro 5880 | 1.4.0 | Yes | No | 6/23/2021 |
Vostro 5890 | 1.0.11 | Yes | Yes | 6/24/2021 |
Vostro 7500 | 1.8.0 | Yes | No | 6/23/2021 |
XPS 13 9305 | 1.0.8 | Yes | No | 6/23/2021 |
XPS 13 2in1 9310 | 2.3.3 | Yes | No | 6/23/2021 |
XPS 13 9310 | 3.0.0 | Yes | No | 6/24/2021 |
XPS 15 9500 | 1.8.1 | Yes | No | 6/23/2021 |
XPS 15 9510 | 1.3.2 | Yes | Yes | 6/23/2021 |
XPS 17 9700 | 1.8.2 | Yes | No | 6/9/2021 |
XPS 17 9710 | 1.1.3 | Yes | Yes | 6/15/2021 |
Solution
CVE-2021-21573 and CVE-2021-21574 were remediated in the BIOSConnect related components on Dell back-end servers on May 28, 2021 and require no additional customer action.
CVE-2021-21571 and CVE-2021-21572 require Dell Client BIOS updates to address the vulnerabilities. See the table under the Additional Information section to determine the version of the remediated Dell Client BIOS to apply to your system. There are multiple ways to update your Dell Client BIOS. If you typically use BIOSConnect to update your BIOS, Dell recommends using a different method to apply the BIOS updates, such as:
- Using one of the Dell notification solutions to be notified and download BIOS updates automatically once available.
- Visiting the Drivers and Downloads site for updates on the applicable products. To learn more, visit the Dell Knowledge Base article Dell BIOS Updates, and download the update for your Dell computer.
- Flashing the BIOS from the F12 One-Time Boot Menu.
For those that cannot apply BIOS updates immediately, Dell has also provided an interim mitigation to disable the BIOSConnect and HTTPS Boot features. See workarounds and Mitigations below.
Workarounds and Mitigations
Dell recommends all customers update to the latest Dell Client BIOS version at the earliest opportunity. Customers who choose not to apply BIOS updates immediately or who are otherwise unable to do so now, should apply the below mitigation.
BIOSConnect:
HTTPS Boot:
Source: DELL