CVE-2022-22558 Dell PowerEdge Server BIOS contains an Improper SMM communication buffer verification vulnerability

Any system running a Dell PowerEdge server configured with an AMD processor system with the exception of Intel processors could be potentially vulnerable. In order to exploit this issue, an attacker must be physically present inside the data center, have local administrative access or have a malicious remote access tool with local access. If any of these conditions are met, an attacker could potentially exploit the vulnerability by installing malware, possibly a denial of service attack, on the targeted system. Dell has received no reports of this vulnerability being exploited in the wild. Dell has released updated BIOS versions for the affected products. For details on the specific firmware versions and affected products, see the Dell Security Advisories. Dell recommends updating your server BIOS to the latest version. As always, up-to-date software is the best way to avoid potential security issues.

Dell PowerEdge Servers Vulnerable to Malware

This vulnerability is a hardware issue in the AMD processors found in Dell PowerEdge servers. Any system running a Dell PowerEdge server configured with an AMD processor system with the exception of Intel processors could be potentially vulnerable to this exploit. In order to exploit this issue, an attacker must be physically present inside the data center and have local administrative access or have a malicious remote access tool with local access. If any of these conditions are met, an attacker could potentially exploit the vulnerability by installing malware on the targeted system. Dell has received no reports of this vulnerability being exploited in the wild. Dell has released updated BIOS versions for the affected products. For details on the specific firmware versions and affected products, see the Dell Security Advisories page . Dell recommends updating your server BIOS to the latest version. As always, up-to-date software is the best way to avoid potential security issues

CVE-2021-22555

Any system configuration running Linux kernel 3.8 or later with the CONFIG_KERNEL_MODE_NEON option enabled, could be potentially vulnerable. In order to exploit this issue, an attacker must be physically present inside the data center, have local administrative access or have a malicious remote access tool with local access. If any of these conditions are met, an attacker could potentially exploit the vulnerability by installing malware on the targeted system. Dell has received no reports of this vulnerability being exploited in the wild. Dell has released updated BIOS versions for the affected products. For details on the specific firmware versions and affected products, see the Dell Security Advisories. Dell recommends updating your server BIOS to the latest version. As always, up-to-date software is the best way to avoid potential security issues.

Vulnerability Overview

A new security vulnerability has been discovered in Dell servers that could allow a malicious remote access tool (RAT) to install malware on the targeted system. The vulnerability, CVE-2022-22558, could potentially allow a compromised system to be used as part of a denial of service attack against other systems in the data center.

Dell PowerEdge Servers Affected by the AMD CPU Vulnerability

Dell PowerEdge servers with AMD CPUs are potentially vulnerable to a malicious attack.
As part of a software update, Dell has released BIOS versions for the affected products.
Dell recommends updating your server BIOS to the latest version.

Timeline

Published on: 04/21/2022 21:15:00 UTC
Last modified on: 05/03/2022 17:44:00 UTC

References