Vulnerable Dell support tool now detected as risky software
7 April 2015 | 0
Security vendor Malwarebytes has flagged the Dell System Detect tool as a potentially unwanted application after older versions of the program were found to put computers at risk.
Last month security researcher Tom Forbes warned that attackers can exploit a weakness in older versions of Dell System Detect to remotely install malware on computers when users visit specially crafted web sites.
The program allows Dell’s support web site to automatically detect the service tags of users’ PCs, so it can offer the corresponding drivers. The tool is offered for download when users click the “Detect Product” button on the web site for the first time and continues to run in the background after installation.
Forbes reported the issue to Dell in November and the company released a patched version of Dell System Detect on 9 January. However, it seems that many users have not yet updated and their computers are still at risk.
Moreover, the version released by Dell in January, 6.0.9, did not completely fix the problem, researchers from F-Secure have said in a blog post. In order to be secure, users need to install version 6.0.14, which also prevents the program from running automatically when the operating system starts, they said.
Data gathered by F-Secure through its products over the past two weeks showed that Dell System Detect is installed on at least 100,000 computers and only about 1% of them run the latest 6.0.14 version.
“We are continuing to investigate further issues and actions that may be necessary to protect our customers,” the F-Secure researchers said.
Security vendor Malwarebytes has said that vulnerable versions of the program will now be detected as PUP.Vulnerable.DellSystemDetect by its products. In the antivirus industry PUP stands for potentially unwanted program.
“We at Malwarebytes are pretty sure there are a lot of folks that won’t know about this vulnerability, so we decided to detect it for the sake of raising awareness,” the company said in a blog post. “Vulnerable versions of this tool have been seen as early as mid 2012 though most likely even earlier, according to our sources so anyone with a Dell system purchased a few years ago should take special notice and run a scan ASAP.”
The owners of Dell computers should either uninstall the tool or ensure that they are running the latest version by following the instructions on Dell’s web site.
Lucian Constantin, IDG News Service