IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Dell patches vulnerability affecting hundreds of computer models worldwide

The vulnerability stems from a Dell driver allowing attackers to bypass security products

Dell has released a security patch for a vulnerability found in a driver file that affects hundreds of desktop and laptop models going back to 2009.

The vulnerability, marked as CVE-2021-21551, has an 8.8 rating on the 10 point CVSS threat scoring system and refers to Dell driver dbutil_2_3.sys, which contains an insufficient access control vulnerability which may lead to escalation of privileges, denial of service, or information disclosure.

It was originally discovered by researchers from Sentinel Labs who found that attackers could exploit these vulnerabilities to locally escalate to kernel-mode privileges. Since 2009, Dell has released hundreds of millions of Windows devices worldwide which contain the vulnerable driver.

The findings, which were proactively reported to Dell on 1 December 2020, essentially found that the vulnerabilities would allow attackers to bypass security products, although the researchers haven’t seen any evidence of this weakness being exploited.

The Dell XPS 13 and 15 range of laptops, the Vostro 7590, and the Precision 5820 XL Tower are all said to be vulnerable to the flaw, as well as every device belonging to the Latitude, Inspirion, and Precision ranges. A full list containing over 380 models has been published by Dell on its website.

The dbutil_2_3.sys driver may have also been installed on Dell systems as part of later firmware update utility packages, Dell Command Update, Dell Update, Alienware Update, Dell System Inventory Agent, or Dell Platform Tags, the company has warned.

Related Resource

Cost of a data breach report 2020

Find out what factors help mitigate breach costs

cost of a data breach report 2020 - whitepaper from IBMDownload now

Dell recommends removing the driver from the system by installing a remediated package containing BIOS, Thunderbolt, TPM or dock firmware; updating Dell Command Update, Dell Update or Alienware Update; or installing the latest version of Dell System Inventory Agent or Dell Platform Tags.

Last month, Microsoft fixed the vulnerability CVE-2021-28310 which was likely being used in a chain alongside other exploits in Windows 10 to seize control of victims’ devices. To use it, hackers would need to already have access to a system, or trick users into running the code on their behalf.

Featured Resources

Join the 90% of enterprises accelerating to the cloud

Business transformation through digital modernisation

Free Download

Delivering on demand: Momentum builds toward flexible IT

A modern digital workplace strategy

Free download

Modernise the workforce experience

Actionable insights and an optimised experience for both IT and end users

Free Download

The digital workplace roadmap

A leader's guide to strategy and success

Free Download

Recommended

Securing endpoints amid new threats
Whitepaper

Securing endpoints amid new threats

30 Jun 2022
Modernise the workforce experience
Whitepaper

Modernise the workforce experience

30 Jun 2022
Delivering on demand: Momentum builds toward flexible IT
Whitepaper

Delivering on demand: Momentum builds toward flexible IT

30 Jun 2022
The digital workplace roadmap
Whitepaper

The digital workplace roadmap

30 Jun 2022

Most Popular

Raspberry Pi launches next-gen Pico W microcontroller with networking support
Hardware

Raspberry Pi launches next-gen Pico W microcontroller with networking support

1 Jul 2022
Xerox CEO John Visentin dies unexpectedly aged 59
Careers & training

Xerox CEO John Visentin dies unexpectedly aged 59

30 Jun 2022
Former Uber security chief to face fraud charges over hack coverup
data breaches

Former Uber security chief to face fraud charges over hack coverup

29 Jun 2022