The security researcher Bill Demirkapi (17) has discovered a critical remote code execution vulnerability in the Dell SupportAssist utility that is pre-installed on most Dell computers.
The vulnerability could be exploited by hackers to compromise systems remotely.
Dell SupportAssist software is described as a tool that proactively checks the health of
To solve the problems Dell SupportAssist interacts with the Dell Support website and automatically detect Service Tag or Express Service Code of Dell product.
The utility performs hardware diagnostic tests and analyzes the hardware configuration of the system, including installed device drivers, and is able to install missing or available driver updates.
The software leverages a local web service that is protected using the “Access-Control-Allow-Origin” response header and implementing restrictions to accept commands only from the “dell.com” website or its subdomains,
“An important integrity check for us is in ClientServiceHandler
Demirkapi discovered that it is possible to bypass the protections implemented by Dell and download and execute malicious code from a remote server under the control of the attackers.
“To bypass the Referer/Origin check, we have a few options:
Dell acknowledged the flaw as explained in a security advisory and released a security update to address it:
The remote code execution flaw, tracked as CVE-2019-3719, affects Dell SupportAssist Client versions prior to version 22.214.171.124.
The expert published a video PoC of the hack and the source code of the proof of concept:
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.