Menu
Vulnerable Dell support tool now detected as risky software

Vulnerable Dell support tool now detected as risky software

Older versions of Dell System Detect contain a serious vulnerability that allows hackers to install malware on users' computers

Security vendor Malwarebytes has flagged the Dell System Detect tool as a potentially unwanted application after older versions of the program were found to put computers at risk.

Last month a security researcher named Tom Forbes warned that attackers can exploit a weakness in older versions of Dell System Detect to remotely install malware on computers when users visit specially crafted websites.

The program allows Dell's support website to automatically detect the service tags of users' PCs, so it can offer the corresponding drivers. The tool is offered for download when users click the "Detect Product" button on the website for the first time and continues to run in the background after installation.

Forbes reported the issue to Dell back in November and the company released a patched version of Dell System Detect on Jan. 9. However, it seems that many users have not yet updated and their computers are still at risk.

Moreover, the version released by Dell in January -- 6.0.9 -- did not completely fix the problem, researchers from F-Secure said Thursday in a blog post. In order to be secure, users need to install version 6.0.14, which also prevents the program from running automatically when the operating system starts, they said.

Data gathered by F-Secure through its products over the past two weeks showed that Dell System Detect is installed on at least 100,000 computers and only about 1 percent of them run the latest 6.0.14 version.

"We are continuing to investigate further issues and actions that may be necessary to protect our customers," the F-Secure researchers said.

On Friday, security vendor Malwarebytes announced that vulnerable versions of the program will now be detected as PUP.Vulnerable.DellSystemDetect by its products. In the antivirus industry PUP stands for potentially unwanted program.

"We at Malwarebytes are pretty sure there are a lot of folks that won't know about this vulnerability, so we decided to detect it for the sake of raising awareness," the company said in a blog post. "Vulnerable versions of this tool have been seen as early as mid 2012 though most likely even earlier, according to our sources so anyone with a Dell system purchased a few years ago should take special notice and run a scan ASAP."

The owners of Dell computers should either uninstall the tool or ensure that they're running the latest version by following the instructions on Dell's website.

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags Dellsecuritypatch managementf-secureMalwarebytesExploits / vulnerabilitiesmalwareantivirus

Slideshows

Meet the leading HP partners in New Zealand...

Meet the leading HP partners in New Zealand...

HP has recognised its top performing partners in New Zealand at the second annual 2016 HP Partner Awards, held at a glittering bash in Auckland. The HP Partner Awards recognises and celebrates excellence, growth, consistency and engagement of its top partners. This year also saw the addition of several new categories, resulting in 11 companies winning across 11 award categories.

Meet the leading HP partners in New Zealand...
Channel comes together as Ingram Micro Showcase hits Auckland

Channel comes together as Ingram Micro Showcase hits Auckland

Ingram Micro outlined its core focuses for 2017 at Showcase in Auckland, bringing together the channel for a day of engaging keynotes, compelling breakout sessions and new technologies.

Channel comes together as Ingram Micro Showcase hits Auckland
Show Comments