Start a Conversation

Solved!

Go to Solution

1 Rookie

 • 

41 Posts

476

July 29th, 2024 09:14

Secure boot is busted is this being worked on dell

HI I would like to now something I was reading an article through pcworld as of today.  The Title of the article is called Secure boot is busted.  What I would like to now is this issue being looked into and possibly being fixed.  Here is the article below:

Secure Boot is busted on hundreds of PCs from Dell, Acer, Intel, and others

One of the pillars of modern PC security is looking pretty shaky after a cryptographic key was leaked on GitHub.
Michael Crider
Staff Writer, PCWorld Jul 26, 2024 7:35 am PDT
generic hacker security monitor green

Secure Boot, a tool that’s built into hundreds of millions of PCs to keep them from loading unverified software via UEFI, is a fundamental cornerstone of modern computer security. It uses cryptographic signatures in hardware components to make sure that nothing connected to your PC can load up code that you (or at least the PC) haven’t verified. That’s why cryptographic key leaks are such a big deal.

Related:How to improve your Windows 11 security

Security research firm Binarly reportsthat leaked cryptographic keys have compromised hardware from several major vendors in the PC industry, including Dell, Acer, Gigabyte, Supermicro, and even Intel. Eight percent of firmware images released in the last four years are compromised, with 22 untrusted keys discovered immediately.

And according to anArs Technica post, “more than 200 device models” from these vendors are affected by one particular key that was posted to an open GitHub repository in late 2022.

Binarly is calling the exploit “PKfail.” The meat and bones of the situation is that a lot of devices in both the consumer and B2B spaces are now vulnerable to attacks on the boot process. This is one of the most dangerous ways in which a computer can be compromised, though attacks do need to be particularly complex to succeed.

0 seconds of 6 secondsVolume 0%
 

It’s the kind of exploit that state-sponsored hackers love, because it’s possible to target extremely specific devices and run code that’s almost undetectable once you get into Windows or a similar OS. (Larger-scale attacks on general users are also possible, but less likely.)

One of the more upsetting issues highlighted by the report is that several vendors actually shipped devices with firmware labeled “DO NOT TRUST” or “DO NOT SHIP,” indicating that they knew about the compromised state of the keys… and ignored it.

It should be easy enough for hardware vendors to update device firmware and remove the compromised binary files, though the breadth of the vulnerability means that some PCs could require multiple firmware updates to cover all affected components.

Binarly has created anonline tool for PKfail detectionthat lets you scan firmware files to see if the corresponding devices are using the compromised keys. Ars Technica’s post goes into more depth and has a full list of the affected hardware models.

Perhaps the most disturbing revelation in all of this is that a single careless post, which was in no way malicious, can instantly make so many devices from so many manufacturers unsafe. And due to the nature of Secure Boot, there doesn’t seem to be any way to stop it from happening again aside from being extremely careful.

I would like to now some advice on how to be careful since I am a consumer who surfs the internet a lot.

Here is the link below:

Secure Boot is busted on 200+ PCs from Dell, Acer, Intel, and others | PCWorld

Community Manager

 • 

3.2K Posts

October 29th, 2024 12:48

To resolve the issue with SecureBoot, please update the BIOS drivers for the following products:

  1. Alienware Aurora R2 Gaming Desktop: Update to Alienware Aurora R16 System BIOS, version 2.13.0 or later. Download and install: Alienware_Aurora_R16_2.13.0_x64.exe.

  2. Alienware Area 51m R2 Gaming Laptop: Update to Alienware Area-51m R2 System BIOS, version 1.29.0 or later. Download and install: Alienware_Area-51m_R2_1.29.0.exe.

  3. Alienware x15 R1 and x17 R1 Gaming Laptops: Update to Alienware x15 and x17 R1 System BIOS, version 1.24.0 or later. Download and install: Alienware_x15_x17_R1_1.24.0.exe.

  4. Alienware x15 R2 and x17 R2 Gaming Laptops: Update to Alienware x15 and x17 R2 System BIOS, version 1.22.0 or later. Download and install: Alienware_x15_x17_R2_1.22.0.exe.

  5. Alienware x14 Gaming Laptop: Update to Alienware x14 System BIOS, version 1.21.0 or later. Download and install: Alienware_x14_1.21.0.exe.

  6. Alienware m15 R3 and m17 R3 Gaming Laptops: Update to Alienware m15 and m17 R3 System BIOS, version 1.29.0 or later. Download and install: Alienware_m15_R3_m17_R3_1.29.0.exe.

  7. Alienware m15 R4 and m17 R4 Gaming Laptops: Update to Alienware m15 and m17 R4 System BIOS, version 1.24.0 or later. Download and install: Alienware_m15_R4_m17_R4_1.24.0.EXE.

  8. Inspiron 3502 Laptop: Update to Dell Inspiron 3502 System BIOS, version 1.18.0 or later. Download and install: Inspiron_3502_1.18.0.exe.

  9. Inspiron 3510 Laptop: Update to Dell Inspiron 15 3510 System BIOS, version 1.21.0 or later. Download and install: Inspiron_3510_1.21.0.exe.

  10. Inspiron 3521 Laptop: Update to Dell Inspiron 3521 System BIOS, version 1.16.0 or later. Download and install: Inspiron_3521_1.16.0.exe.

  11. Alienware Aurora R13 Gaming Desktop: Update to Alienware Aurora R13 System BIOS, version 1.21.0 or later. Download and install: Alienware_Aurora_R13_1.21.0_x64.exe.

  12. Alienware Aurora Ryzen Edition R14 Gaming Desktop: Update to Alienware Aurora Ryzen Edition System BIOS, version 2.19.0 or later. Download and install: Alienware_Aurora_Ryzen_Edition_R14_2.19.1.exe.

  13. Alienware Aurora R15 AMD Gaming Desktop: Update to Alienware Aurora R15 AMD System BIOS, version 1.15.0 or later. Download and install: Alienware_Aurora_R15_AMD_1.15.0.exe.

  14. Alienware Aurora R15 Gaming Desktop: Update to Alienware Aurora R15 System BIOS, version 1.17.0 or later. Download and install: Alienware_Aurora_R15_1.17.0_x64.exe.

  15. XPS 8950 Desktop: Update to Dell XPS 8950 System BIOS, version 1.21.0 or later. Download and install: XPS_8950_1.21.0_x64.exe.

  16. XPS 8960 Desktop: Update to Dell XPS 8960 System BIOS, version 2.12.0 or later. Download and install: XPS8960_2.12.0_x64.exe.

1 Rookie

 • 

8 Posts

July 30th, 2024 11:48

I would like to add that there is a Git Hub page listed under:

PKfail/BRLY-2024-005.md

That page contains a powershell script to check if a Linux or Windows machine is using Platform Keys (PK) compromised by what is currently referred to as PKFail.  My Inspiron Machine was NOT listed on the affected device list but returned TRUE when running the script in PowerShell (compromised keys).

Please refer to this link and stay tuned to the source for further updates:

https://github.com/binarly-io/Vulnerability-REsearch/blob/main/PKfail/BRLY-2024-005.md

1 Rookie

 • 

8 Posts

August 1st, 2024 14:50

Dell Inspiron 3647 is not on the Github list as effected, but that is also returning a positive for me for PKfail using that Powershell script.

Anyone have any advice on how to fix this?  Does a firmware update actually fix it?  If one of these PKfail-vulnerable machines gets infected, then what?  Can it actually be cleaned?  Presumably wiping OS is not good enough if you have a rootkit.  

1 Rookie

 • 

8 Posts

August 5th, 2024 01:20

I found this article in response to PKFail by Intel. They said all the machines affected are "end of life cycle" so nothing will be done.  The linked article they suggest may provide insight on how the root of trust is establised and how to mitigate compromised keys. Warning, its very long and highly technical. Good Luck.

https://www.intel.com/content/www/us/en/security-center/announcement/intel-security-announcement-2024-07-25-001.html

I found other discussions on Reddit talking about "haha, who actually uses OEM provided keys? Dont use those if you care about security." Great, Thanks.

      I will be calling Dell tomorrow to talk to a tech and see what needs updates they have or if they intend to work it etc etc. They have known about it for over 90 days, after 90 days, its released to the public. That was just on the 24th of July, 2024

1 Rookie

 • 

6 Posts

August 6th, 2024 08:53

I too have tried getting a response from our Dell manager, and nothing has arrived yet :-(
mutter mutter 200+ machines affected by the known issues 

Community Manager

 • 

3.2K Posts

August 12th, 2024 12:57

Dell Technologies is aware of the Pkfail vulnerability reported by Binarly that may affect a small number of consumer PCs. BIOS updates for potentially impacted devices are in progress.

1 Rookie

 • 

6 Posts

August 28th, 2024 14:33

1 Rookie

 • 

1 Message

March 11th, 2025 12:18

Hi, getting this on the Dell Inspiron 3650 from the age of this post and that there hasn't been any movement I presume this model will never be included?

(edited)

No Events found!

Top