Categories: CVE/vulnerability

Dell SupportAssist Bug Exposes Business & Home PCs Let Hackers Attack Hundreds of Million Dell Computers

A high severity vulnerability resides in Dell SupportAssist for Business & Home PCs allows a low privileged user to execute arbitrary code with admin privileges on vulnerable installations.

The Dell SupportAssist is a monitoring tool that comes preinstalled on most Dell devices running Windows operating systems.

It automatically checks for system health, if any issues detected it will notify Dell for troubleshooting.

Dell SupportAssist is the smart technology that keeps your computer running at its best, Customers with Premium Support or Premium Support Plus with the feature, reads Dell statement.

Uncontrolled Search Path Vulnerability

A low privileged user could exploit this vulnerability to cause the loading of arbitrary DLLs by the SupportAssist binaries, resulting in the privileged execution of arbitrary code, reads Dell advisory.

This vulnerability would occur if the application uses the directory search path to find executables, but the path allows contains a directory that can be modified by an attacker.

If the attacker gained access to the locations searched by the software, the attacker can place a malicious library that can be loaded by the application.

The vulnerability can be tracked as CVE-2020-5316 and received a CVSS Base Score: 7.8. Following are the affected versions

Dell SupportAssist for business PCs version 2.0, 2.0.1, 2.0.2, 2.1, 2.1.1, 2.1.2, 2.1.3

Dell SupportAssist for home PCs version 2.0, 2.0.1, 2.0.2, 2.1, 2.1.1, 2.1.2, 2.1.3, 2.2, 2.2.1, 2.2.2, 2.2.3, 3.0, 3.0.1, 3.0.2, 3.1, 3.2, 3.2.1, 3.2.2, 3.3, 3.3.1, 3.3.2, 3.3.3, 3.4

Fixed Versions

  • Dell SupportAssist for business PCs version 2.1.4
  • Dell SupportAssist for home PCs version 3.4.1

Dell advises users to update with the latest version at the earliest, if you have auto-update enabled, then it will get updated automatically.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering critical…

1 day ago

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for WordPress,…

2 days ago

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign embedded…

2 days ago

New Ransomware Attack Targets Elon Musk Supporters Using PowerShell to Deploy Payloads

A newly identified ransomware campaign has emerged, seemingly targeting supporters of Elon Musk through a…

2 days ago

Printer Company Distributes Malicious Drivers Infected with XRed Malware

Procolored, a printer manufacturing company, has been found distributing software drivers infected with malicious code,…

2 days ago

Chinese Agent Impersonate as Stanford Student For Intelligence Gathering

Chinese intelligence operative posing as a Stanford University student has been uncovered following an investigation…

2 days ago