Menu
Vulnerable Dell support tool now detected as risky software

Vulnerable Dell support tool now detected as risky software

Older versions of Dell System Detect contain a serious vulnerability that allows hackers to install malware on users' computers

Security vendor Malwarebytes has flagged the Dell System Detect tool as a potentially unwanted application after older versions of the program were found to put computers at risk.

Last month a security researcher named Tom Forbes warned that attackers can exploit a weakness in older versions of Dell System Detect to remotely install malware on computers when users visit specially crafted websites.

The program allows Dell's support website to automatically detect the service tags of users' PCs, so it can offer the corresponding drivers. The tool is offered for download when users click the "Detect Product" button on the website for the first time and continues to run in the background after installation.

Forbes reported the issue to Dell back in November and the company released a patched version of Dell System Detect on Jan. 9. However, it seems that many users have not yet updated and their computers are still at risk.

Moreover, the version released by Dell in January -- 6.0.9 -- did not completely fix the problem, researchers from F-Secure said Thursday in a blog post. In order to be secure, users need to install version 6.0.14, which also prevents the program from running automatically when the operating system starts, they said.

Data gathered by F-Secure through its products over the past two weeks showed that Dell System Detect is installed on at least 100,000 computers and only about 1 percent of them run the latest 6.0.14 version.

"We are continuing to investigate further issues and actions that may be necessary to protect our customers," the F-Secure researchers said.

On Friday, security vendor Malwarebytes announced that vulnerable versions of the program will now be detected as PUP.Vulnerable.DellSystemDetect by its products. In the antivirus industry PUP stands for potentially unwanted program.

"We at Malwarebytes are pretty sure there are a lot of folks that won't know about this vulnerability, so we decided to detect it for the sake of raising awareness," the company said in a blog post. "Vulnerable versions of this tool have been seen as early as mid 2012 though most likely even earlier, according to our sources so anyone with a Dell system purchased a few years ago should take special notice and run a scan ASAP."

The owners of Dell computers should either uninstall the tool or ensure that they're running the latest version by following the instructions on Dell's website.


Follow Us

Join the newsletter!

Error: Please check your email address.

Tags Dellsecuritypatch managementf-secureMalwarebytesExploits / vulnerabilitiesmalwareantivirus

Featured

Slideshows

HP channel recognised at 2017 Partner Awards

HP channel recognised at 2017 Partner Awards

The HP Partner Awards 2017 at Shed 10 kicked off with an AMD-sponsored hackers lounge, a mysterious gaming style area filled with dry ice and red lasers, the waiters wearing Mr Robot style masks.

HP channel recognised at 2017 Partner Awards
Tech industry comes together as Lexel celebrates turning 30

Tech industry comes together as Lexel celebrates turning 30

Leading figures within the technology industry across New Zealand came together to celebrate 30 years of success for Lexel Systems, at a milestone birthday occasion at St Matthews in the City.​

Tech industry comes together as Lexel celebrates turning 30
HP re-imagines education through Auckland event launch

HP re-imagines education through Auckland event launch

HP New Zealand held an inaugural Evolve Education event at Aotea Centre in Auckland, welcoming over 70 principals, teachers and education experts to explore ways of shaping and enhancing learning using technology.

HP re-imagines education through Auckland event launch
Show Comments