In Dell SupportAssist utility, that serves for debugging, diagnostic and automatic drivers’ updates is found serious vulnerability (CVE-2019-3719).It allows remotely perform a code with administrator’s privileges on Dell computers and laptops.
According to experts’ assessments, issue involves significant number of devices, as Dell SupportAssist instrument installed on all Dell’s PCs and laptops that are supplied with Windows (systems that are sold without OS are nor sensitive to vulnerability).
“When we think of Remote Code Execution (RCE) vulnerabilities in mass, we might think of vulnerabilities in the operating system, but another attack vector to consider is “What third-party software came with my PC?”, — warns cybersecurity researcher Bill Demirkapi that discovered a bug.
As instruments work with administrator’s rights, attacker will get full access to targeted device.
“When I was learning more about how Dell SupportAssist works, I intercepted different types of requests from Dell’s support site”, — said Bill Demirkapi.
As researcher explained, for having opportunity of remote code performing, intruder have to exercise ARP– and DNS- spoofing attacks on victim’s computer.
Demirkapi presents two possible scenarios: first suggest access to public Wi-Fi networks or large corporate networks, where at least one device can be used for ARP– and DNS– spoofing attacks while second scenario suggests compromising of local router and modification of DNS-traffic directly on the device.
Demirkapi published on GitHub PoC-code for exploitation of vulnerability and presented a video that demonstrates attack in action.
Dell company has already fixed vulnerability with launching of new Dell SupportAssist 220.127.116.11 version, owners of vulnerable Dell devices are advised to install it as soon as possible.