In het programma dat is standaard op Dell-computers zijn geïnstalleerd gevonden ernstige kwetsbaarheid

In Dell SupportAssist nut, die dient voor het debuggen, updates diagnostische en automatische drivers’ wordt gevonden ernstige kwetsbaarheid (CVE-2019-3719).

ikt allows remotely perform a code with administrator’s privileges on Dell computers and laptops.

Volgens de evaluatie van deskundigen, probleem betrekking aanzienlijk aantal hulpmiddelen, zoals Dell SupportAssist instrument installed on all Dell’s PCs and laptops that are supplied with Windows (systems that are sold without OS are nor sensitive to vulnerability).

“When we think of Remote Code Execution (RCE) vulnerabilities in mass, we might think of vulnerabilities in the operating system, but another attack vector to consider is “What third-party software came with my PC?”, — warns cybersecurity researcher Bill Demirkapi that discovered a bug.

According to his words, in certain conditions CVE-2019-3719 opens opportunity to intercept control over vulnerable devices. For doing so, intruders have only to lure the victim on the malware web-site that contains JavaScript which makes Dell SupportAssist download and start malware files on a system.

As instruments work with administrator’s rights, attacker will get full access to targeted device.

“When I was learning more about how Dell SupportAssist works, I intercepted different types of requests from Dell’s support site”, — said Bill Demirkapi.

As researcher explained, for having opportunity of remote code performing, intruder have to exercise ARP– and DNS- spoofing attacks on victim’s computer.

Demirkapi presents two possible scenarios: first suggest access to public Wi-Fi networks or large corporate networks, where at least one device can be used for ARP– and DNS– spoofing attacks while second scenario suggests compromising of local router and modification of DNS-traffic directly on the device.

Demirkapi published on GitHub PoC-code for exploitation of vulnerability and presented a video that demonstrates attack in action.

Dell company has already fixed vulnerability with launching of new Dell SupportAssist 3.2.0.90 Versie, owners of vulnerable Dell devices are advised to install it as soon as possible.

Bron: https://d4stiny.github.io

Over Trojan Killer

Carry Trojan Killer Portable op je memory stick. Zorg ervoor dat u in staat om uw pc te weerstaan ​​elke cyberdreigingen overal mee naar toe bent.

Controleer ook

MageCart op de Heroku Cloud Platform

Onderzoekers vonden verschillende MageCart Web Skimmers Op Heroku Cloud Platform

Onderzoekers van Malwarebytes rapporteerde over het vinden van een aantal MageCart web skimmers op de Heroku cloud-platform …

Android Spyware CallerSpy

CallerSpy spyware maskers als een Android-chat-applicatie

Trend Micro deskundigen ontdekte de malware CallerSpy, waarachter een Android chat-toepassing en, …

Laat een antwoord achter