Dell’s SupportAssist utility that comes pre-set up on millions of Dell laptops and PCs incorporates a security vulnerability that could let malicious program or rogue logged-in end users to escalate their privileges to administrator-level and access sensitive info.
Uncovered by security researchers at SafeBreach Labs, the vulnerability, identified as CVE-2019-12280, is a privilege-escalation challenge and affects Dell’s SupportAssist application for business enterprise PCs (model 2.) and dwelling PCs (version 3.2.1 and all prior variations).
Dell SupportAssist, previously regarded as Dell System Detect, checks the overall health of your system’s hardware and software, alerting shoppers to get suitable motion to take care of them. To do so, it operates on your pc with Technique-degree permissions.
With this large-stage privileges, the utility interacts with the Dell Guidance internet site and automatically detects Company Tag or Convey Service Code of your Dell merchandise, scans the present system motorists and installs lacking or offered driver updates, together with carrying out hardware diagnostic assessments.
Nonetheless, scientists at SafeBreach Labs uncovered that the application insecurely masses .dll files from person-controlled folders when operate, leaving a place for malware and rogue logged-in customers to corrupt current DLLs or swap them with destructive ones.
As a result, when SupportAssist loads these tainted DLLs, malicious code receives injected into the system and executed within the context of an administrator, consequently conveniently making it possible for the attacker to obtain full handle of a specific technique.
“According to Dell’s website, SupportAssist is pre-installed on most of Dell products managing Home windows. This suggests that as lengthy as the software package is not patched, the vulnerability influences tens of millions of Dell Pc users,” the scientists say.
What is actually worrisome? Researchers consider that Dell is not the only enterprise whose PCs are impacted by this certain safety challenge.
Due to the fact Dell SupportAssist is composed and preserved by Nevada-dependent diagnostics and customer aid firm Computer-Health practitioner, other Laptop makers that bundle the identical diagnostic and troubleshooting applications into their individual computers with distinct names could also be susceptible.
“Immediately after SafeBreach Labs sent the information to Dell, we uncovered that this vulnerability affects more OEMs which use a rebranded version of the Laptop-Health care provider Toolbox for Windows application components,” the researchers say.
Also, according to the Computer system-Health care provider website, Personal computer makers have “pre-mounted over 100 million copies of Laptop-Physician for Home windows on pc devices throughout the world,” which means the flaw also has an effect on other OEMs that count on Personal computer-Medical professional for specialised troubleshooting equipment.
Because Dell’s SupportAssist software program use a signed driver by Personal computer-Health care provider to accessibility minimal-amount memory and hardware, researchers shown this vulnerability to browse the material of an arbitrary actual physical memory tackle as a proof-of-notion.
SafeBreach Labs documented the vulnerability to Dell on 29th April 2019, and the organization then reported the difficulty to Pc Physician and introduced fixes presented by Computer-Physician on 28th May possibly for afflicted SupportAssist variations.
Dell Company and house Pc end users are proposed to update their software to Dell SupportAssist for Business enterprise PCs version 2..1 and Dell SupportAssist for Dwelling PCs version 3.2.2 respectively.
It is not the to start with time when Dell SupportAssist has been found influenced by a critical stability vulnerability.
In April this year, Dell also addressed a vital distant code execution vulnerability in the utility that would have allowed remote attackers to down load and set up malware from a distant server on impacted Dell computers and take comprehensive regulate over them.