{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T15:35:09.306","vulnerabilities":[{"cve":{"id":"CVE-2022-34436","sourceIdentifier":"security_alert@emc.com","published":"2023-01-18T12:15:10.510","lastModified":"2024-11-21T07:09:33.580","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"\nDell iDRAC8 version 2.83.83.83 and prior contain an improper input validation vulnerability in Racadm when the firmware lock-down configuration is set. A remote high privileged attacker could exploit this vulnerability to bypass the firmware lock-down configuration and perform a firmware update.\n\n\n\n\n\n"},{"lang":"es","value":"La versión 2.83.83.83 de Dell iDRAC8 y las anteriores contienen una vulnerabilidad de validación de entrada incorrecta en Racadm cuando se establece la configuración de bloqueo del firmware. Un atacante remoto con privilegios elevados podría aprovechar esta vulnerabilidad para evitar la configuración de bloqueo del firmware y realizar una actualización del firmware."}],"metrics":{"cvssMetricV31":[{"source":"security_alert@emc.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N","baseScore":2.7,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":1.2,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N","baseScore":4.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":1.2,"impactScore":3.6}]},"weaknesses":[{"source":"security_alert@emc.com","type":"Secondary","description":[{"lang":"en","value":"CWE-20"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:dell:idrac8_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"2.84.84.84","matchCriteriaId":"7A92817B-6C1E-4DA1-BBCB-1264BABD3699"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:dell:idrac8:-:*:*:*:*:*:*:*","matchCriteriaId":"B0591F64-CBB4-440D-AB35-F8D5AC8A536B"}]}]}],"references":[{"url":"https://www.dell.com/support/kbdoc/en-us/000205346/dsa-2022-265-dell-idrac8-and-dell-idrac9-security-update-for-a-racadm-vulnerability","source":"security_alert@emc.com","tags":["Patch","Vendor Advisory"]},{"url":"https://www.dell.com/support/kbdoc/en-us/000205346/dsa-2022-265-dell-idrac8-and-dell-idrac9-security-update-for-a-racadm-vulnerability","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}