Latitude 5288 Firmware

by Dell

Standard maintenance is sufficient

Latitude 5288 Firmware has low exploitation rates. Attackers rarely target this software's known vulnerabilities.

What to do
  1. Keep automatic updates enabled
  2. No urgent action needed
  3. Review periodically as part of normal maintenance

What Attackers Target

Vulnerabilities with high exploit probability 0.0%
Confirmed actively exploited (CISA) 0.0%
Public exploit code available 0.0%
Based on 46 known vulnerabilities. Percentages show the proportion that are actively dangerous — a low percentage means most vulnerabilities in this product are not being exploited.

Most Dangerous Vulnerabilities

CVE CVSS Exploit Probability Confirmed
CVE-2023-48674 6.8 0.1%
CVE-2022-34398 7.5 0.1%
CVE-2019-3717 6.8 0.1%
CVE-2024-32855 3.8 0.1%
CVE-2024-22429 7.5 0.1%
CVE-2020-5326 6.1 0.1%
CVE-2022-26860 7.5 0.1%
CVE-2020-5362 7.1 0.1%
CVE-2024-0158 5.1 0.0%
CVE-2022-26861 7.9 0.0%
CVE-2022-26858 6.1 0.0%
CVE-2021-36324 7.5 0.0%
CVE-2021-36323 7.5 0.0%
CVE-2021-36342 7.5 0.0%
CVE-2021-36325 7.5 0.0%
CVE-2021-36343 7.5 0.0%
CVE-2024-38483 5.8 0.0%
CVE-2023-28075 6.9 0.0%
CVE-2022-26859 6.1 0.0%
CVE-2023-25938 5.1 0.0%
0
/ 100
low-risk
Active Threat 0/50 · Minimal
Exploit Availability 0/50 · Minimal

Score uses Wilson score intervals to account for sample size. Products with few CVEs are scored conservatively.