Dell reportedly sat silently on a critical SupportAssist vulnerability for nearly 6 months, according to the security researcher that reported it to the company. If you have the software installed, then chances are that your laptop will be affected, and it will be open to attackers unless you have recently updated SupportAssist.

Reviews , News , CPU , GPU , Articles , Columns , Other "or" search relation. 5G , Accessory , AMD , Android , Apple , ARM , Audio , Bay Trail , Business , Cannon Lake , Charts , Chinese Tech , Chromebook , Coffee Lake , Comet Lake , Console , Convertible / 2-in-1 , Cryptocurrency , Cyberlaw , Deal , Desktop , Fail , Foldable , Gadget , Galaxy Note , Galaxy S , Gamecheck , Gaming , Geforce , Google Nexus / Pixel , How To , Ice Lake , Internet of Things (IoT) , iOS , iPad Pro , iPhone , Kaby Lake , Lakefield , Laptop , Launch , Linux / Unix , MacBook , Mini PC , Monitor , MSI , OnePlus , Opinion , Phablet , Project Athena , Renoir , Review Snippet , Rocket Lake , Rumor , Ryzen (Zen) , Security , Smart Home , Smartphone , Smartwatch , Software , Storage , Tablet , ThinkPad , Thunderbolt , Tiger Lake , Touchscreen , Ultrabook , Virtual Reality (VR) / Augmented Reality (AR) , Wearable , Whiskey Lake , Windows , Workstation , XPS , Zen 3 (Vermeer) Ticker

If you have a Dell laptop, stop what you are doing and check what version of Dell SupportAssist you have installed. If its version number is older than 3.2.0.90, then download the latest version immediately; you can find the installer here, which we have taken from Dell Support. Uninstalling it would be a good alternative too.

Why you ask? Well, it turns out that SupportAssist has been open to attackers for a long time, and Dell has only just fixed it. The company markets the software as "the industry’s first automated proactive and predictive support technology" that it has designed to "proactively check the health of your system’s hardware and software". Importantly, Dell pre-installs this is on "most of all new" devices. Putting that abstract statement into context, Dell reported a US$10.9 billion revenue from laptop and PC sales earlier this year according to Bloomberg, so it is talking about installing SupportAssist on millions of computers.

All credit goes to Bill Demirkapi, who found this vulnerability and reported it to Dell. He has a blog that goes into great detail on this matter covers the matter. You can also find him on Twitter @BillDemirkapi.

In short, the security issue that he found centres on how the SupportAssist client communicates with the Dell Support website when finding and installing new drivers. Dell has configured the client to download and automatically install drivers, the files for which can be intercepted. An attacker could then send out their own malicious files and have SupportAssist automatically install them. Demirkapi has released a proof of concept video that we have included below, while Dell has now fixed the vulnerability and published an advisory note, which you can read here.

It is bad enough that it took a teenager to find a security exploit that seems to be by design, but Dell's handling of the issue makes matters even worse. This will have affected millions of computers, yet it took the company almost six months to release a fix from when it first responded to Demirkapi's initial report. He listed the timeline of events as follows:

10/26/2018 - Initial write up sent to Dell.

10/29/2018 - Initial response from Dell.

11/22/2018 - Dell has confirmed the vulnerability.

11/29/2018 - Dell scheduled a “tentative” fix to be released in Q1 2019.

01/28/2019 - Disclosure date extended to March.

03/13/2019 - Dell is still fixing the vulnerability and has scheduled disclosure for the end of April.

04/18/2019 - Vulnerability disclosed as an advisory.