web analytics

Dell Computers Vulnerable To Man In The Middle Attack

Not one but two vulnerabilities

eDellRoot

 

 

 

 

 

 

 

 

 

Some Dell computers are found to be vulnerable to man in the middle attack. This is because an issue with a root certificate authority. The vulnerable was discovered by Joe Nord, who pointed out that a certificate named eDellRoot which was valid till 2039. This certificate is installed by Dell, on a number of computers with private keys. The same private key is now public, this private key has been used on numerous dell computers, which opens a door for hackers.

Dell responded by saying that

… installed by our Dell Foundation Services application on our PCs, unintentionally introduced a security vulnerability. The certificate was implemented as part of a support tool and intended to make it faster and easier for our customers to service their system

Hackers can also sign the eDellRoot certificate, which means hackers can sign a malware disguising as a if it was from a company.

eDellRoot 3

 

 

 

 

 

 

 

 

 

 

Vulnerable Dell Computers

So far only this models have been found to be vulnerable.

  • Inspiron 7000 (laptop and desktop)
  • Dell Orchid Touch
  • Dell t4034

Researchers have also found another root certificate named DSDTestProvier. This certificate is similar to eDellRoot certificate. An attacker can generate certificates signed by the DSDTestProvider CA. Systems that trusts the DSDTestProvider CA will trust any certificate issued by the CA. An attacker can impersonate web sites and other services, sign software and email messages, and decrypt network traffic and other data. Common attack scenarios include impersonating a web site, performing a MiTM attack to decrypt HTTPS traffic, and installing malicious software

When we became aware of the issue, we immediately dug into all our applications that get pre-loaded on our PCs. We can confirm we have found no other root certificates on our factory installed PC images. What we did find was that the Dell System Detect application and its DSDTestProvider root certificate had similar characteristics to eDellRoot. Dell responded.

Mitigation
Users can revoke the DSDTestProvider certificate by launching the Windows certificate manager (“certmgr.msc”) and moving the DSDTestProvider certificate from the Trusted Root Certificate Store to Untrusted Certificates.

Official document by dell with detailed information.

Author: Shivniel Gounder

TheGeek : Writes about information security, privacy, cybersecurity and latest tech gadgets and more.

Share This Post On

Submit a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: