Security News Hidden 'backdoor' in Dell security software gives hackers full access

omidomi

Level 71
Thread author
Verified
Honorary Member
Top Poster
Malware Hunter
Well-known
Apr 5, 2014
6,008
Security researchers are warning Dell security management software admins to patch their systems after finding six high-risk vulnerabilities.

One of the highest-rated "critical" flaws involves a hidden default account with an easily-guessable password in Dell's Sonicwall Global Management System (GMS), a widely-used software used to centrally monitor and manage an enterprise's array of networked security devices.

The vulnerability could allow an attacker "full control" of the software and all connected appliances, such as virtual private networking (VPN) appliances and firewalls.

The flaws were detailed in an advisory posted by researchers at Digital Defense, a Texas-based firm that has a commercial stake in the vulnerability scanning business.

However, there's no evidence to suggest the flaws have been actively exploited by attackers, the researchers said.

Dell acknowledged the flaws affect the most recent versions of the GMS software -- versions 8.0 and 8.1 -- and issued patches. In a security advisory, the company said it "highly recommends" that admins install the hotfix, available from its support pages.


A Dell spokesperson said in an email late Thursday:

The recent situation raised by Digital Defense, Inc. is related to six vulnerabilities in the Dell SonicWALL Global Management System (GMS), which could allow an attacker control of the software and connected appliances. Unlike intentional "backdoors," these were software flaws that could allow users to enter the system.

Upon learning of the situation, SonicWALL immediately issued patches to the affected versions of the GMS software and there is no evidence to suggest the flaws have been actively exploited by attackers. Customer security is a top concern and priority for Dell, and we strongly encourage customers who want to ensure they have the latest versions of their SonicWALL software to visit [the support website].
 

securitydolphin

Level 1
Verified
Jul 22, 2016
16
Of course, this is only an issue if you are actually attacked from that vector; since the patch appeared to be rolled out quite quickly I don't think any enterprises would be affected by this (contrary to the scary phrasing in the article). In the case that this happens to CONSUMERS, understand that downloading ANY vendor-based software is a big no-no since unless that software is a mandatory requirement to run your system, you will do much better looking at other 3rd-party offerings from reputable sources.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top