News

Over 100 Dell Models At Risk Due to BIOSConnect Vulnerabilities

Eclypsium has discovered a number of vulnerabilities related to the BIOSConnect function (provides remote firmware update and OS recovery functions), which is part of the Dell SupportAssist utility.

The problem is that we are talking about millions of PCs, laptops and tablets, as the utility is preinstalled on most Dell computers.

The vulnerability chain discovered by Eclypsium researchers scored 8.3 out of 10 on the CVSS vulnerability rating scale. The issue allows privileged remote attackers to impersonate Dell.com (through a Machine-in-the-Middle attack) and take control of the boot process by delivering a malicious update to the target device.

vulnerabilities in BIOSConnect

Researchers identified one issue leading to an insecure TLS connection from BIOS to Dell (CVE-2021-21571) and three overflow vulnerabilities (CVE-2021-21572, CVE-2021-21573, and CVE-2021-21574). Two flaws affect the OS recovery process, and another bug affects the firmware update process. As a result, each of the problems can lead to the execution of arbitrary code in the BIOS.

The issue affects 129 models of Dell consumer and business laptops, desktops and tablets, including devices protected with Secure Boot and Dell Secured core. The discussed vulnerabilities allow an attacker to remotely exploit the host’s UEFI firmware and gain control over the most privileged code on the device. This combination of remote use and high privilege is likely to make remote update an attractive target for attackers, and organizations should ensure that their devices are updated accordingly. <span class="su-quote-cite"><a href="http://www.eclypsium.com/2021/06/24/biosdisconnect/" target="_blank">Experts warn.</a></span>

It is estimated that approximately 30,000,000 devices are affected. An attacker can control the boot process of the host operating system and disable protection to remain undetected. This will allow him to gain a foothold in the system, while having the highest privileges on the device.

According to Eclypsium, users will have to update the BIOS/UEFI of all affected devices. Experts also recommend using an alternative method (not BIOSConnect) for applying BIOS updates.

Dell is already releasing BIOS/UEFI updates for affected machines and executable patches on Dell.com. So, CVE-2021-21573 and CVE-2021-21574 do not require additional actions from the user, since they were eliminated on the server side back in May 2021.

However, to fix CVE-2021-21571 and CVE-2021-21572, users need to update the BIOS.

Users who are not yet able to update their systems can disable BIOSConnect from the BIOS setup page or Dell Command | Configure (DCC).

Let me remind you that we wrote that Cybersecurity experts discovered the second ever bootkit for UEFI.

Sending
User Review
0 (0 votes)
Comments Rating 0 (0 reviews)

Daniel Zimmermann

Daniel Zimmermann has been writing on security and malware subjects for many years and has been working in the security industry for over 10 years. Daniel was educated at the Saarland University in Saarbrücken, Germany and currently lives in New York.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Sending

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Back to top button