Categories: CVE/vulnerability

Dell SupportAssist Bug Exposes Business & Home PCs Let Hackers Attack Hundreds of Million Dell Computers

A high severity vulnerability resides in Dell SupportAssist for Business & Home PCs allows a low privileged user to execute arbitrary code with admin privileges on vulnerable installations.

The Dell SupportAssist is a monitoring tool that comes preinstalled on most Dell devices running Windows operating systems.

It automatically checks for system health, if any issues detected it will notify Dell for troubleshooting.

Dell SupportAssist is the smart technology that keeps your computer running at its best, Customers with Premium Support or Premium Support Plus with the feature, reads Dell statement.

Uncontrolled Search Path Vulnerability

A low privileged user could exploit this vulnerability to cause the loading of arbitrary DLLs by the SupportAssist binaries, resulting in the privileged execution of arbitrary code, reads Dell advisory.

This vulnerability would occur if the application uses the directory search path to find executables, but the path allows contains a directory that can be modified by an attacker.

If the attacker gained access to the locations searched by the software, the attacker can place a malicious library that can be loaded by the application.

The vulnerability can be tracked as CVE-2020-5316 and received a CVSS Base Score: 7.8. Following are the affected versions

Dell SupportAssist for business PCs version 2.0, 2.0.1, 2.0.2, 2.1, 2.1.1, 2.1.2, 2.1.3

Dell SupportAssist for home PCs version 2.0, 2.0.1, 2.0.2, 2.1, 2.1.1, 2.1.2, 2.1.3, 2.2, 2.2.1, 2.2.2, 2.2.3, 3.0, 3.0.1, 3.0.2, 3.1, 3.2, 3.2.1, 3.2.2, 3.3, 3.3.1, 3.3.2, 3.3.3, 3.4

Fixed Versions

  • Dell SupportAssist for business PCs version 2.1.4
  • Dell SupportAssist for home PCs version 3.4.1

Dell advises users to update with the latest version at the earliest, if you have auto-update enabled, then it will get updated automatically.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Cyberhaven Hacked – Chrome Extension With 400,000 users Compromised

Cyberhaven, a prominent cybersecurity company, disclosed that its Chrome extension With 400,000+ users was targeted…

4 minutes ago

AT&T and Verizon Hacked – Salt Typhoon Compromised The Network For High Profiles

AT&T and Verizon Communications, two of America's largest telecommunications providers, have confirmed they were targeted…

40 minutes ago

Lumma Stealer Attacking Users To Steal Login Credentials From Browsers

Researchers observed Lumma Stealer activity across multiple online samples, including PowerShell scripts and a disguised…

2 days ago

New ‘OtterCookie’ Malware Attacking Software Developers Via Fake Job Offers

Palo Alto Networks reported the Contagious Interview campaign in November 2023, a financially motivated attack…

2 days ago

NjRat 2.3D Pro Edition Shared on GitHub: A Growing Cybersecurity Concern

The recent discovery of the NjRat 2.3D Professional Edition on GitHub has raised alarms in…

2 days ago

Palo Alto Networks Vulnerability Puts Firewalls at Risk of DoS Attacks

A critical vulnerability, CVE-2024-3393, has been identified in the DNS Security feature of Palo Alto…

2 days ago