Absolutely no one is exempt from being able to suffer, potentially, vulnerabilities. The important thing is that manufacturers realize this in time and that they fix it, as has been the case with Dell. They have found a possible vulnerability that affects almost all the laptops sold since 2009, and that although it does not affect all the brand’s machines, it does affect a total of 380 models, which is not little precisely. The list of all affected machines is in the manufacturer’s website.
What does the vulnerability affect Dell laptops?
The security patch they have deployed solves a vulnerability called «insufficient access control vulnerability»That affects the driver dbutil_2_3.sys, which is found in the brand’s notebooks that come with a Windows operating system from the factory and that have Dell’s automatic firmware update system. As we have said before, this does not affect all the brand’s laptops, but it does affect a total of 380 models sold since 2009, which are almost all of them.
The machines affected range from the best-selling Latitude family to the G-Series gaming laptops. This vulnerability would allow unauthorized access to the machine (via malware) that would allow privilege escalation (that is, obtaining administrator permissions on the machine) at the kernel level. In other words, this vulnerability could allow an attacker to gain full control of the machine, including its files and with the possibility of modifying whatever they want, since the permissions are at the lowest level, the kernel.
What should you do if your machine is affected?
If your Dell laptop is on the list of those affected by the vulnerability, the first thing you should do is uninstall the driver from your system. There are three main ways to do this, and the first one is to download and run the utility DSA-2021-088 that Dell has already made available to users and will take care of everything for you so you don’t have to worry.
Alternatively, you can check in the directories C: Users »Your username» AppDataLocalTemp and in C: WindowsTemp on your computer if the dbutil_2_3.sys driver is present, and if so, you must select it and permanently delete it (to do this, select it and press the SHIFT + DEL keys, answering yes in the pop-up window that will appear).
The third method involves using one of Dell’s notification solutions (such as Dell Command, Dell Update, or Dell SupportAssist) to apply the security patch automatically. This method is the simplest so as not to complicate your life, but you must bear in mind that the security patch that solves the vulnerability will not be available by this method until next May 10.
Once you’ve gotten rid of the vulnerable driver, you should update your device’s firmware as soon as possible to get a new, patched version of this driver. Once done, you don’t have to do anything else or worry again as long as you keep your laptop up to date.