A set of four vulnerabilities has been found on Thursday by the cybersecurity researchers of Eclypsium in the BIOSConnect feature of Dell SupportAssist. After investigating the vulnerability, the researchers claimed that the Dell Client BIOS could be misuse by a privileged network adversary.
The main motive of the hackers is to gain arbitrary code execution at the BIOS/UEFI level of the device that has been affected. Not only this but the experts also stated that this vulnerability allows the threat actors, to remotely implement code within the BIOS of impacted devices.
However, to come into the safe side the users must update the system BIOS/UEFI for all affected systems. Apart from this, the users can also use some other alternative techniques that will help them to stay safe other than the SupportAssist’s BIOSConnect feature to put the BIOS updates.
Among the four vulnerabilities, the CVE-2021-21571 and CVE-2021-21572 vulnerabilities need Dell Client BIOS updates so that they can be addressed fully.
However, on the other side CVE-2021-21573 and CVE-2021-21574 don’t need any further additional customer action.
The security researchers of Eclypsium reported that the SupportAssist software of Dell is not get affected for the first time, as the company has patched a very high severity remote code execution vulnerability in May 2019 in SupportAssist software.
Here, the cause of the remote code execution vulnerability was an improper origin validation weakness, and later in 2018, it has been reported by security researcher Bill Demirkapi.
Moreover, in 2015 another RCE flaw has been found in Dell system detection software by the security researcher Tom Forbes.
RCE flaw allows the threat actors to activate the buggy program so that they can easily download and implement the arbitrary files without having any interaction with the users.
The initial step that has to be followed to stop this vulnerability is that all the affected systems should get updated accordingly, and the analysts suggested all the users not to use the BIOSConnect to execute the firmware update. Meanwhile, Dell will keep updating the affected executables that are being delivered.
According to the report, the security researchers of the Eclypsium has completed their investigation on March 2 into Dell’s software, and a day later the experts notified the Dell PSIRT.
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.
Also Read: Hundreds of Millions of Dell Systems Vulnerable to Hack Due to Driver Bug
Hackers were actively exploiting the generative AI for cyber attacks; not only that, even threat actors are also exploring new…
Security researchers have published a Proof-of-Concept (PoC) exploit for a critical vulnerability in the widely used PuTTY SSH and Telnet…
Modern cars have microcontrollers that use the Controller Area Network (CAN) to perform safety and luxury functions. However, vehicle hijacking…
The latest Nexusguard DDoS Trend Report for 2024 has unveiled a significant escalation in the size of Distributed Denial of…
Researchers have identified a new form of cyberattack termed "LLMjacking," which exploits stolen cloud credentials to hijack cloud-hosted large language…
In a recent cybersecurity breakthrough, researchers have unveiled significant updates to the HijackLoader malware, a sophisticated modular loader notorious for…