Dell patches vulnerability affecting hundreds of computer models worldwide
The vulnerability stems from a Dell driver allowing attackers to bypass security products
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
Dell has released a security patch for a vulnerability found in a driver file that affects hundreds of desktop and laptop models going back to 2009.
The vulnerability, marked as CVE-2021-21551, has an 8.8 rating on the 10 point CVSS threat scoring system and refers to Dell driver dbutil_2_3.sys, which contains an insufficient access control vulnerability which may lead to escalation of privileges, denial of service, or information disclosure.
It was originally discovered by researchers from Sentinel Labs who found that attackers could exploit these vulnerabilities to locally escalate to kernel-mode privileges. Since 2009, Dell has released hundreds of millions of Windows devices worldwide which contain the vulnerable driver.
The findings, which were proactively reported to Dell on 1 December 2020, essentially found that the vulnerabilities would allow attackers to bypass security products, although the researchers haven’t seen any evidence of this weakness being exploited.
The Dell XPS 13 and 15 range of laptops, the Vostro 7590, and the Precision 5820 XL Tower are all said to be vulnerable to the flaw, as well as every device belonging to the Latitude, Inspirion, and Precision ranges. A full list containing over 380 models has been published by Dell on its website.
The dbutil_2_3.sys driver may have also been installed on Dell systems as part of later firmware update utility packages, Dell Command Update, Dell Update, Alienware Update, Dell System Inventory Agent, or Dell Platform Tags, the company has warned.
Dell recommends removing the driver from the system by installing a remediated package containing BIOS, Thunderbolt, TPM or dock firmware; updating Dell Command Update, Dell Update or Alienware Update; or installing the latest version of Dell System Inventory Agent or Dell Platform Tags.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Last month, Microsoft fixed the vulnerability CVE-2021-28310 which was likely being used in a chain alongside other exploits in Windows 10 to seize control of victims’ devices. To use it, hackers would need to already have access to a system, or trick users into running the code on their behalf.
Zach Marzouk is a former ITPro, CloudPro, and ChannelPro staff writer, covering topics like security, privacy, worker rights, and startups, primarily in the Asia Pacific and the US regions. Zach joined ITPro in 2017 where he was introduced to the world of B2B technology as a junior staff writer, before he returned to Argentina in 2018, working in communications and as a copywriter. In 2021, he made his way back to ITPro as a staff writer during the pandemic, before joining the world of freelance in 2022.
-
European Commission confirms hackers breached mobile management platformNews Security experts warned the breach could lead to follow-up phishing attacks
-
Lenovo names Andy Rhodes as new general manager for UK&INews The former HP and Dell executive replaces Adrian Criddle as the tech vendor targets growth opportunities across the region
-
Experts welcome EU-led alternative to MITRE's vulnerability tracking schemeNews The EU-led framework will reduce reliance on US-based MITRE vulnerability reporting database
-
‘Resilience debt’ is now one of the most pressing cyber challenges for enterprises – here's what it means and how you can tackle itNews Research from Dell Technologies suggests the gap between cyber resilience and perception of readiness is getting bigger
-
Veeam patches Backup & Replication vulnerabilities, urges users to updateNews The vulnerabilities affect Veeam Backup & Replication 13.0.1.180 and all earlier version 13 builds – but not previous versions.
-
Two Fortinet vulnerabilities are being exploited in the wild – patch nowNews Arctic Wolf and Rapid7 said security teams should act immediately to mitigate the Fortinet vulnerabilities
-
Everything you need to know about Google and Apple’s emergency zero-day patchesNews A serious zero-day bug was spotted in Chrome systems that impacts Apple users too, forcing both companies to issue emergency patches
-
Security experts claim the CVE Program isn’t up to scratch anymore — inaccurate scores and lengthy delays mean the system needs updatedNews CVE data is vital in combating emerging threats, yet inaccurate ratings and lengthy wait times are placing enterprises at risk
-
IBM AIX users urged to patch immediately as researchers sound alarm on critical flawsNews Network administrators should patch the four IBM AIX flaws as soon as possible
-
Critical Dell Storage Manager flaws could let hackers access sensitive data – patch nowNews A trio of flaws in Dell Storage Manager has prompted a customer alert
