Dell refused to establish ‘insecure autoupdate app’

Dell has refused to construct trapdoors into its hardware after a security researcher discovered an insecure update assistant app.According to Tom Forbes, the Dell Service Tag Detector app is unprotected and it creates an indirect access on devices it is installed upon.

Forbes has also declared that the app comprises a Remote Code Execution (RCE) risk which would create a means for hijackers to run malware onto vulnerable systems. The hijackers could provoke the program to download and execute an arbitrary file without any user’s consent.

“The little ‘Dell Service Tag Detector’ program that they push people to download on the Dell.com website does a lot more than just detect service tags – it gives Dell access to your entire machine, allowing them to download and install software and collect system information without you knowing,” Forbes told El Reg.

The issue was reported to Dell in November. In response to queries from El Reg, Dell issued a statement refusing that it ever installed trapdoors on PCs it supplies.

Dell has a long-standing commitment to design, build and ship secure products and quickly address instances when issues are discovered. A key Dell priority is the protection of customer data and information, which is reflected in our robust and comprehensive privacy and information security program and policies. We take very seriously any issues that may impact the integrity of our products or customer security and privacy.

Should we become aware of a possible vulnerability in any of Dell’s products we will communicate with our customers in a transparent manner as we have done in the past.

Dell does not work with any government to compromise our products to make them vulnerable for exploit, including through ‘software implants’ or so-called ‘backdoors.

The statement given by Dell does not identify security concerns that Forbes raises about Dell Service Tag Detector. Forbes and other security researchers require clarification.

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...