![]() We encourage customers to review the Dell Security Advisory (DSA-2021-088) and follow the remediation steps as soon as possible. ![]() We have seen no evidence this vulnerability has been exploited by malicious actors to date. The bugs could allow attackers to bypass security and gain kernel-level permissions to execute code and even move from one device to another by gaining access to an organisation's network.Īccording to Dell, the vulnerable driver module is not available pre-installed on its machines and is available only once you have applied a BIOS, Thunderbolt, TPM, or dock firmware update to your system.ĭell also sent this statement to Gadgets 360: "We remediated a vulnerability ( CVE-2021-21551) in a driver (dbutil_2_3.sys) affecting certain Windows-based Dell computers. This means that the serious vulnerabilities have remained undisclosed for not less than 12 years. ![]() The firmware update driver module in question has been in use since at least 2009 and is available even on the latest Dell machines. Dell has released a security patch for its firmware update driver module that carried as many as five high-severity flaws that are impacting potentially hundreds and millions of its desktops, laptops, notebooks, and tablets based on Windows.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |