CVE-2025-36579
Weak Password Recovery Vulnerability in Dell BIOS Enables Unauthorized Access
Publication date: 2026-04-16
Last updated on: 2026-04-16
Assigner: Dell
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| dell | client_platform_bios | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-640 | The product contains a mechanism for users to recover or change their passwords without knowing the original password, but the mechanism is weak. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Dell Client Platform BIOS and involves a weak password recovery mechanism. It allows an unauthenticated attacker who has physical access to the system to potentially exploit this weakness and gain unauthorized access.
How can this vulnerability impact me? :
The impact of this vulnerability is that an attacker with physical access to your system could bypass authentication controls by exploiting the weak password recovery mechanism. This could lead to unauthorized access, potentially compromising confidentiality, integrity, and availability of your system.