A vulnerability in the Dell SupportAssist utility exposes Dell laptops and personal computers to a remote attack that can allow hackers to execute code with admin privileges on devices using an older version of this tool and take over users' systems.
Dell has released a patch for this security flaw on April 23; however, many users are likely to remain vulnerable unless they've already updated the tool --which is used for debugging, diagnostics, and Dell drivers auto-updates.
The number of impacted users is believed to be very high, as the SupportAssist tool is one of the apps that Dell will pre-install on all Dell laptops and computers the company ships with a running Windows OS (systems sold without an OS are not impacted).
According to Bill Demirkapi, a 17-year-old security researcher from the US, the Dell SupportAssist app is vulnerable to a "remote code execution" vulnerability that under certain circumstances can allow attackers an easy way to hijack Dell systems.
Because the Dell SupportAssist tool runs as admin, attackers will have full access to targeted systems, if they manage to get themselves in the proper position to execute this attack.
Attack requires LAN/router compromise
"The attacker needs to be on the victim's network in order to perform an ARP Spoofing Attack and a DNS Spoofing Attack on the victim's machine in order to achieve remote code execution," Demirkapi told ZDNet today in an email conversation.
This might sound hard, but it isn't as complicated as it appears.
Two scenarios in which the attack could work include public WiFi networks or large enterprise networks where there's at least one compromised machine that can be used to launch the ARP and DNS attacks against adjacent Dell systems running the SupportAssist tool.
Another plausible scenario is in situations where hackers have compromised the users' local WiFi router, and are in a position to alter DNS traffic directly on the router.
As we've seen in the past few months, hacking routers to hijack DNS traffic isn't a sophisticated attack anymore and is happening more and more often, mainly due to the sad state of router security [1, 2].
Attack requires no user interaction
As Demirkapi explained to ZDNet, the iframe will point to a subdomain of dell.com, and then a DNS spoofing attack performed from an attacker-controlled machine/router will return an incorrect IP address for the dell.com domain, allowing the attacker to control what files are sent and executed by the SupportAssist tool.
The good news is that Dell took the researcher's report seriously and has worked for the past months to patch CVE-2019-3719, a task that concluded last week with the release of SupportAssist v126.96.36.199, which Dell users are now advised to install.
Proof of concept to reproduce an attack is available on GitHub, and Demirkapi also published a demo video showing how easily an attack can lead to a full device compromise. Demirkapi's vulnerability report, for additional technical details, is available on the young researcher's blog.
More vulnerability reports:
- Mobile app used in Car2go fraud scheme to steal 100 vehicles
- Security flaw lets attackers recover private keys from Qualcomm chips
- New Oracle WebLogic zero-day discovered in the wild
- Nokia 9 buggy update lets anyone bypass fingerprint scanner with a pack of gum
- Over two million IoT devices vulnerable because of P2P component flaws
- KRACK attack: Here's how companies are responding CNET
- Top 10 app vulnerabilities: Unpatched plugins and extensions dominate TechRepublic