Dell refused to establish 'insecure autoupdate app'


Dell has refused to construct trapdoors into its hardware after a security researcher discovered an insecure update assistant app.According to Tom Forbes, the Dell Service Tag Detector app is unprotected and it creates an indirect access on devices it is installed upon.



Forbes has also declared that the app comprises a Remote Code Execution (RCE) risk which would create a means for hijackers to run malware onto vulnerable systems. The hijackers could provoke the program to download and execute an arbitrary file without any user’s consent.

"The little 'Dell Service Tag Detector' program that they push people to download on the Dell.com website does a lot more than just detect service tags - it gives Dell access to your entire machine, allowing them to download and install software and collect system information without you knowing," Forbes told El Reg.

The issue was reported to Dell in November. In response to queries from El Reg, Dell issued a statement refusing that it ever installed trapdoors on PCs it supplies.

Dell has a long-standing commitment to design, build and ship secure products and quickly address instances when issues are discovered. A key Dell priority is the protection of customer data and information, which is reflected in our robust and comprehensive privacy and information security program and policies. We take very seriously any issues that may impact the integrity of our products or customer security and privacy.

Should we become aware of a possible vulnerability in any of Dell’s products we will communicate with our customers in a transparent manner as we have done in the past.

Dell does not work with any government to compromise our products to make them vulnerable for exploit, including through ‘software implants’ or so-called ‘backdoors.

The statement given by Dell does not identify security concerns that Forbes raises about Dell Service Tag Detector. Forbes and other security researchers require clarification.