A critical vulnerability in the Dell Client Platform BIOS has been identified, potentially allowing hackers to hijack compromised systems. This flaw, identified as CVE-2024-39584, is classified as a “Use of Default Cryptographic Key” vulnerability. It poses a significant risk, with a CVSS base score of 8.2, indicating a high impact on affected systems.
The vulnerability allows a high-privileged attacker with local access to bypass Secure Boot and execute arbitrary code on the affected systems. This could lead to complete system compromise, affecting confidentiality, integrity, and availability.
“Dell Client Platform BIOS remediation is available for a Use of Default Cryptographic Key vulnerability that could be exploited by malicious users to compromise the affected system,” reads the advisory.
Free Webinar on Detecting & Blocking Supply Chain Attack -> Book your Spot
Dell has released updates to mitigate this vulnerability. The affected products and their respective BIOS versions are as follows:
- Alienware Area 51m R2: Versions prior to 1.29.0
- Alienware Aurora R15 AMD: Versions prior to 1.15.0
- Alienware m15 R3: Versions prior to 1.29.0
- Alienware m15 R4: Versions prior to 1.24.0
- Alienware m17 R3: Versions prior to 1.29.0
- Alienware m17 R4: Versions prior to 1.24.0
- Alienware x14: Versions prior to 1.21.0
- Alienware x15 R1: Versions prior to 1.24.0
- Alienware x15 R2: Versions prior to 1.22.0
- Alienware x17 R1: Versions prior to 1.24.0
- Alienware x17 R2: Versions prior to 1.22.0
Dell has urged users to update their BIOS to the remediated versions released on August 27 and 28, 2024, to protect against potential exploitation. Users can find these updates on the Dell Drivers & Downloads site.
Currently, there are no alternative workarounds or mitigations available for this vulnerability. Users are strongly encouraged to apply the BIOS updates as soon as possible to secure their systems.
Dell Technologies has acknowledged the efforts of the BINARLY Research team in identifying and reporting this critical issue. The company emphasizes the importance of timely updates to safeguard against potential threats.
For more information, users are advised to visit Dell’s security advisory page and ensure their systems are up-to-date with the latest security patches.
Are You From SOC/DFIR Teams? - Try Advanced Malware and Phishing Analysis With ANY.RUN - 14 day free trial