Dell SupportAssist bugs set more than 30 million PCs at threat

Stability scientists have found four major stability vulnerabilities in the BIOSConnect aspect of Dell SupportAssist, allowing for attackers to remotely execute code inside of the BIOS of impacted devices. According to Dell’s web-site, the SupportAssist software is “preinstalled on most Dell gadgets operating Windows working program,” while BIOSConnect provides remote firmware update and OS […]

Stability scientists have found four major stability vulnerabilities in the BIOSConnect aspect of Dell SupportAssist, allowing for attackers to remotely execute code inside of the BIOS of impacted devices.

According to Dell’s web-site, the SupportAssist software is “preinstalled on most Dell gadgets operating Windows working program,” while BIOSConnect provides remote firmware update and OS recovery features.

The chain of flaws discovered by Eclypsium researchers comes with a CVSS foundation rating of 8.3/10 and allows privileged distant attackers to impersonate Dell.com and consider command of the goal device’s boot course of action to break OS-stage safety controls.

“These an attack would enable adversaries to manage the device’s boot process and subvert the running method and higher-layer safety controls,” Eclypsium researchers demonstrate in a report shared in advance with BleepingComputer.

“The issue influences 129 Dell versions of customer and business laptops, desktops, and tablets, including devices protected by Secure Boot and Dell Secured-main PCs,” with approximately 30 million specific gadgets uncovered to attacks.

BIOSConnect attack scenario
Impression: Eclypsium

The reasearchers identified just one situation primary to an insecure TLS relationship from BIOS to Dell (tracked as CVE-2021-21571) and a few overflow vulnerabilities (CVE-2021-21572, CVE-2021-21573, and CVE-2021-21574).

Two of the overflow safety flaws “impact the OS recovery process, while the other impacts the firmware update method,” Eclypsium states. “All 3 vulnerabilities are unbiased, and each one could lead to arbitrary code execution in BIOS.”

Additional info on the vulnerabilities can be observed in Eclypsium’s report and the complete listing of influenced unit types in Dell’s advisory.

Customers advised not to use BIOSConnect for updating their BIOS

In accordance to Eclypsium, people will have to update the program BIOS/UEFI for all affected devices. The researchers also recommend using an alternate approach other than the SupportAssist’s BIOSConnect attribute to implement BIOS updates on their devices.

Dell is providing BIOS/UEFI updates for impacted devices and updates to afflicted executables on Dell.com.

CVE-2021-21573 and CVE-2021-21574 don’t call for need further purchaser motion as they have been dealt with server aspect on May 28, 2021. On the other hand, the CVE-2021-21571 and CVE-2021-21572 vulnerabilities have to have Dell Client BIOS updates to be absolutely addressed.

Buyers who are unable to immediately update their units can disable BIOSConnect from the BIOS setup web site or making use of the Dell Command | Configure (DCC)‘s Remote System Administration tool.

“The distinct vulnerabilities lined in this article make it possible for an attacker to remotely exploit the UEFI firmware of a host and attain regulate about the most privileged code on the device,” the scientists concluded.

“This combination of distant exploitability and higher privileges will possible make remote update functionality an alluring concentrate on for attackers in the upcoming, and corporations must make confident to observe and update their gadgets accordingly.”

Dell computer software plagued by essential flaws

This is not the very first time house owners of Dell personal computers have been exposed to attacks by safety vulnerabilities uncovered in the SupportAssist application.

Two yrs in the past, in May perhaps 2019, the company patched yet another large-severity SupportAssist remote code execution (RCE) vulnerability caused by an poor origin validation weak spot and claimed by stability researcher Monthly bill Demirkapi in 2018.

This RCE permitted unauthenticated attackers on the same Network Entry layer with specific techniques to remotely execute arbitrary executables on unpatched equipment.

Security researcher Tom Forbes observed a equivalent RCE flaw in the Dell Process Detect software program in 2015, allowing for attackers to trigger the buggy program to down load and execute arbitrary files with out user interaction.

SupportAssist was all over again patched a person 12 months later on, in February 2020, to tackle a safety flaw thanks to a DLL lookup-buy hijacking bug that enabled area attackers to execute arbitrary code with Administrator privileges on vulnerable gadgets.

Final but not the very least, final thirty day period Dell resolved a flaw making it feasible to escalate privileges from non-admin buyers to kernel privileges, a bug identified in the DBUtil driver that ships with tens of tens of millions of Dell devices.

Next Post

Pilot Reveals Server Area Underneath Airbus 350 Cockpit

Fri Jun 25 , 2021
It’s no top secret that pilots on very long-haul flights have obtain to private sleeping quarters that travellers by no means see, but it turns out there are additional surprises concealed absent inside a present day airliner, which includes an total server room complete of rack mounted personal computers and […]