Dell released a security update to fix a vulnerability of its support software (SupportAssist Client). SupportAssist allows users from the same Network Access layer that have not been identified to remotely run malware executable on vulnerable computers.
According to the company's website, SupportAssist software is "pre-installed on most of Dell's new devices running the Windows operating system" and "actively monitors the health of both the hardware and the system software." When it finds a problem, it sends it to Dell to start troubleshooting. ”
Most new Dell computers are exposed to Remote Code Execution (RCE) attacks.
The defect of the software has been reported as CVE-2019-3719 (CVSSv3) that reaches 8.0 from the National Vulnerability Database (or NVD)).
Dell updated SupportAssist software at the end of April of 2019 after an initial report received from a 17 security researcher (Bill Demirkapi) on 10 October 2018.
Dell advises all its clients to update the SupportAssist Client as soon as possible by indicating that all versions prior to 3.2.0.90 are vulnerable to remote code execution attacks.
Dell reportedly also repaired an improper origin validation flaw in the SupportAssist Client software reported by John C. Hennessy-ReCar, which has been reported as CVE-2019-3718 with a high-grade 3.0 rating (CVSS v8,8).
Security researcher Bill Demirkapi has discovered that RCE vulnerability can be exploited by attackers using ARP and DNS violations such as describes in detail on proof-of-concept which he published.
Watch the video demo on YouTube that shows its PoC
_________________
- Secret Crush: New Feature on Facebook Dating
- Windows 10: Free upgrade works yet
- MIT: researcher solves a puzzle after 20 years
- Windows 10 1903: Termination of passwords
- Exercise in a Box by GCHQ: Try out the strengths of your business for free