This issue can be exploited remotely if the system has Remote Desktop enabled. In order to locate vulnerable systems, you can use a tool such as Nmap. Other than this, users are advised to update the BIOS of their systems when a new version becomes available. Dell has released all the relevant information regarding this vulnerability below, including a list of systems that are vulnerable and a list of systems that are not vulnerable. We have also listed all the updates that you should make.
Dell System Receiving BSOD After BIOS Update
Dell has released a BIOS update that fixes this vulnerability. Download the relevant firmware from Dell's website and apply it to your system, then reboot.
Systems Vulnerable:
* Dell EMC PowerEdge R610
* Dell EMC PowerEdge R815
* Dell EMC PowerEdge R920
Systems Not Vulnerable:
* Dell EMC PowerEdge T620 * Dell EMC PowerEdge T630 * Dell EMC PowerEdge T840
How to check if your system is vulnerable?
To check if your system has this vulnerability, you can use a tool such as Nmap. If you are connected to the internet with Remote Desktop enabled, you will be vulnerable to the issue. Other than this, users are advised to update the BIOS of their systems when a new version becomes available. Dell has released all the relevant information regarding this vulnerability below, including a list of systems that are vulnerable and a list of systems that are not vulnerable.
Dell Product Listing
Systems that are not vulnerable to CVE-2022-31226:
Systems within the following list are not vulnerable to CVE-2022-31226 and do not need to be updated:
Dell PowerEdge R815
Dell PowerEdge M1000e
Dell Dimension E521
Dell Dimension 8500
Dell Latitude D630
Dell Precision T3400
Dell Software and System Updates
Dell has released a BIOS update, which is available to all customers. Updated versions of the Dell Data Protection | Security Solution (IDS) and the Dell System Detect software are also available.
Timeline
Published on: 09/12/2022 19:15:00 UTC
Last modified on: 09/15/2022 19:25:00 UTC