Disclaimer: We may earn a commission if you make any purchase by clicking our links. Please see our detailed guide here.

Follow us on:

Google News

Dell Issues Security Patch in Millions of Computers Going Back to 2009

Meet the voice behind Indo-Asian News Service (IANS), a storyteller navigating the currents of global events with precision and depth. Crafting narratives that bridge cultures, IANS brings you the pulse of the world in every word

Join the Opinion Leaders Network

Join the Techgenyz Opinion Leaders Network today and become part of a vibrant community of change-makers. Together, we can create a brighter future by shaping opinions, driving conversations, and transforming ideas into reality.

Dell has issued a security patch for millions of its computers dating back to 2009 after cybersecurity research firm SentinelLabs found five serious bugs in Dell and Alienware software that allows hackers to gain full permissions in Windows on the devices.

These high-severity vulnerabilities, which have remained present and undisclosed for 12 years in Dell devices for 12 years, affect hundreds of millions of devices and millions of users worldwide.

“The impact this could have on users and enterprises that fail to patch is far-reaching and significant,” said Kasif Dekel, Senior Security Researcher at SentinelOne.

While the cybersecurity firm has not seen any indicators that these vulnerabilities have been exploited in the wild up till now, with hundreds of millions of enterprises and users currently vulnerable, “it is inevitable that attackers will seek out those that do not take the appropriate action”.

The list of affected Dell computers has over 380 models, including some of the latest XPS 13 and 15 models, and the G3, G5, and G7 gaming laptops.

Dell has also listed almost 200 affected computers that it considers to be no longer receiving service.

Both Dell and SentinelLabs, however, stressed they haven’t seen evidence of the vulnerability being exploited by hackers.

The high severity flaws could allow any user on the computer, even without privileges, to escalate their privileges and run code in kernel mode.

“Among the obvious abuses of such vulnerabilities are that they could be used to bypass security products,” the report said.

An attacker with access to an organisation’s network may also gain access to execute code on unpatched Dell systems and use this vulnerability to gain local elevation of privilege. Attackers can then leverage other techniques to pivot to the broader network, like lateral movement.

“These multiple high-severity vulnerabilities in Dell software could allow attackers to escalate privileges from a non-administrator user to kernel mode privileges,” the report noted.


Partner With Us

Digital advertising offers a way for your business to reach out and make much-needed connections with your audience in a meaningful way. Advertising on Techgenyz will help you build brand awareness, increase website traffic, generate qualified leads, and grow your business.

Power Your Business

Solutions you need to super charge your business and drive growth

More from this topic