Faulty update mechanism puts millions of Dell devices at risk

Scammers
(Image credit: Pixabay)

Cybersecurity researchers have discovered four critical vulnerabilities in the pre-boot environment of Dell devices that exposes them to remote code execution attacks.

Security vendor Eclypsium reports that the vulnerabilities in Dell's BIOSConnect tool affect well over a hundred Dell device models including both consumers and business desktops, laptops, and tablets.

BIOSConnect is the firmware updates and remote operating system recovery tool feature that is part of the SupportAssist support tool that comes bundled with Dell computers.

“Our research has identified a series of four vulnerabilities that would enable a privileged network attacker to gain arbitrary code execution within the BIOS of vulnerable machines,” reads the report from Eclypsium.

Dell has already put out patches to mitigate the vulnerabilities.

Alluring target

According to Threatpost the bugs allow threat actors to circumvent the Secure Boot protections of the Dell devices, control its boot process, and subvert the operating system and higher-layer security controls.

The core vulnerability involves an insecure TLS connection between Dell and the BIOS on their devices. The report explains that thanks to the bug, the BIOSConnect TLS connection will accept "any valid wildcard certificate."

This, the researchers note, effectively allows attackers to impersonate Dell and deliver any malicious content to the victim’s device.

The other three vulnerabilities are buffer overflow vulnerabilities, which are enabled by the exploited insecure TLS connection, and allow arbitrary code execution at the BIOS/Unified Extensible Firmware Interface (UEFI) level. 

Eclypsium believes that the Dell vulnerabilities show that as vendors increasingly switch to over-the-air update processes, any unaddressed vulnerabilities in the mechanism can have serious consequences. 

“This combination of remote exploitability and high privileges will likely make remote update functionality an alluring target for attackers in the future,” Eclypsium concludes

TOPICS
Mayank Sharma

With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’s TechRadar Pro’s expert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.

Read more
A concept image of someone typing on a computer. A red flashing danger sign is above the keyboard and nymbers and symbols also in glowing red surround it.
New UEFI Secure Boot flaw exposes systems to bootkits
Skull and Bones
Experts warn DNA sequencers are vulnerable to bootkit attacks
Representational image depecting cybersecurity protection
Hackers are breaking SonicWall products to target business networks
Security
Broadcom releases fixes for multiple VMware security flaws
AMD logo
Security flaw means AMD Zen CPUs can be "jailbroken"
An illustration of a hand holding a set of keys in front of a laptop, accompanied by a padlock symbol, fingerprint, and key.
Thousands of SonicWall VPN devices are facing worrying security threats
Latest in Pro
Google Cloud logo
Google to acquire cloud security platform Wiz in $32 billion deal
GIMP 3.0 interface from the website
Our favorite free photo editor finally got the update it deserves - and these are the top 5 features designers should know about
Close up of a person touching an email icon.
Criminals are using CSS to get around filters and track email usage
DeepSeek on a mobile phone
More US government departments ban controversial AI model DeepSeek
Ransomware
Fortinet firewall bugs are being targeted by LockBit ransomware hackers
A graphic showing someone on a tablet working through a supply chain.
How phishing attacks are hitting the supply chain – and how to fight back
Latest in News
Lego Pokemon
Pokemon and Lego announce the most electrifying collaboration of all time and I’m going to be first in line
Apple Watch app health
Apple Watch blood pressure monitoring tech revealed in patent
Using Zipped files and folders in Windows 11
Hidden clues suggest Microsoft is moving another part of Windows 11’s Control Panel to the Settings app – and this time it’s mouse options
Core Time 2 and COre 2 Duo watches running Pebble OS
Pebble is back! Pebble founder announces two new smartwatches, and they're basically the opposite of an Apple Watch in every way
an image of the Samsung Galaxy S24 Ultra
Finally! One UI 7 has a release date - here are the Samsung phones that’ll get it first
Google Cloud logo
Google to acquire cloud security platform Wiz in $32 billion deal