Categories
high-priority issues

Dell issues high-priority Safety patch for Countless Servers dating back to 2009

What just happened? If you thought your aging Dell laptop was safe from modern malware or hacking exploits, think again. Dell has just released a retroactive, high-priority software patch for hundreds of its machines, some of which have initial releases dating back to 2009. The patch addresses an “insufficient access control vulnerability” present in the…

What just happened? If you believed your aging Dell notebook was safe from contemporary malware or hacking exploits, think again. Dell has just released a retroactive, high-priority application patch for hundreds of its own machines, a few of which have initial releases dating back into 2009.

The patch addresses an”insufficient access control vulnerability” within the dbutil_2_3. Sys driver, that may be located on Windows-equipped Dell systems with user-installed firmware upgrade packages. Not all Dell machines are affected, but many are; 380, to be precise.

Impacted machines range from Dell’s Latitude line-up to its Inspirons and even its G-series gaming laptops. The vulnerability will allow someone using the machine (which can be obtained via malware) to escalate privileges and gain kernel-level permissions.

You can get a complete list of affected machines on Dell’s site — it is too expansive for us to list here. If one of your machines is on that record, your first priority must be to remove the offending driver from your system.

There are three principal ways to do this. First, you can download and operate the DSA-2021-088 utility, which will automate the process for you — we’d recommend this for most people. As an alternative, you can check the C:UsersAppDataLocalTemp and C:WindowsTemp directories in your system to find out whether the motorist is visible. If it is, choose the document, hold down Shift, and then press the Delete key on your keyboard.

The last process involves utilizing one of Dell’s notification solutions (such as Dell Command, Dell Update, or Dell SupportAssist) to automatically apply the patch. This is definitely the most convenient option (and the one that demands the least technical knowledge), however, Dell’s notification solutions will not support the DSA-2021-088 utility until May 10, 2021.

Once you have removed the vulnerable driver, upgrade your device’s firmware at your earliest convenience to acquire a”remediated” version of this file. Dell’s notification alternatives will work for this as well.

And that is just about it! If you’ve removed the driver and subsequently updated your device, you need to be all set. Hopefully, most people patch their machines before too much harm can be done.

Image credit: Monitcello, Nor Gal

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *