{"id":10250,"date":"2019-06-26T00:39:00","date_gmt":"2019-06-25T22:39:00","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=10250"},"modified":"2023-08-25T22:52:46","modified_gmt":"2023-08-25T20:52:46","slug":"serious-vulnerability-in-dells-pc-doctor-assistant","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2019\/06\/26\/serious-vulnerability-in-dells-pc-doctor-assistant\/","title":{"rendered":"Serious vulnerability in Dell's PC Doctor Assistant"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" align=\"left\" height=\"47\">[<a href=\"https:\/\/www.borncity.com\/blog\/2019\/06\/24\/schwere-sicherheitslcke-in-dells-pc-doctor-assistant\/\" target=\"_blank\" rel=\"noopener noreferrer\">German<\/a>]PC-Doctor SupportAssist, which is pre-installed on many Dell systems, has a serious security vulnerability that allows permissions to be exploited. The component is also found in products from Corsair, Staples and Tobi. Dell has released an update.<\/p>\n<p><!--more--><\/p>\n<p>I have already been informed of the topic by blog readers Leon from Greece a few days ago. Leon had sent me the link to <a href=\"https:\/\/web.archive.org\/web\/20210115220424\/https:\/\/safebreach.com\/Post\/OEM-Software-Puts-Multiple-Laptops-At-Risk\" target=\"_blank\" rel=\"noopener noreferrer\">this website<\/a>. During last weekend other blog-readers also send me similar hints. Thank you very much for the information. Unfortunately I haven't time to publish an article about this topic.<\/p>\n<h2><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg07.met.vgwort.de\/na\/1c582e08b26f4fe589c3d2ecd762c790\" width=\"1\" height=\"1\">Background: PC-Doctor Toolbox for Windows<\/h2>\n<p>The PC-Doctor SupportAssist is a rebranded component of the PC-Doctor Toolbox for Windows. This software can be downloaded from <a href=\"http:\/\/www.pc-doctor.com\/support\/index.php?option=com_content&amp;view=article&amp;id=7:toolbox&amp;catid=9:solutions&amp;Itemid=117\" target=\"_blank\" rel=\"noopener noreferrer\">this website<\/a>, and contains various feature for monitoring a PC. If you read the feature description, the software is a 'must have'. But I myself would describe it as 'snake oil', which is advertised as a universal solution, but not really needed. <\/p>\n<p>But various OEMs such as Dell ships this toolbox or components of it on their systems &#8211; sometimes under a slightly different name. The components that enable Dell's SupportAssist to access sensitive low-level hardware (such as physical memory, PCI and SMBios) come from the PC-Doctor Toolbox and were written by PC-Doctor. Also products of Corsair, Staples and Tobi contain this PC-Doctor Toolbox for Windows or at least components of it. <\/p>\n<h2>Dell SupportAssist<\/h2>\n<p>Dell SupportAssist is a software that comes from the PC-Doctor Toolbox mentioned above and is pre-installed on most Dell PCs. The software proactively checks the state of the system's hardware and software. These 'health checks' of certain system components require permissions at a high level &#8211; i.e. administrator rights are required. To perform actions that require high permissions, a signed driver is installed in addition to several services running as a SYSTEM. So much for preliminary remarks on the subject. <\/p>\n<h2>SafeBreach finds serious vulnerability<\/h2>\n<p>Such constructions naturally arouse the interest of various safety researchers, including Peleg Hadar of SafeBreach Labs. In the first approach, he concentrated on the services concerned, as he writes on <a href=\"http:\/\/www.pc-doctor.com\/support\/index.php?option=com_content&amp;view=article&amp;id=7:toolbox&amp;catid=9:solutions&amp;Itemid=117\" target=\"_blank\" rel=\"noopener noreferrer\">this website<\/a>. Especially the service \"Dell Hardware Support\" is critical, because it allows access to the PC hardware with high authorization level and has the possibility to initiate a privilege escalation. <\/p>\n<p><p>After the Dell hardware support service is launched, it runs the <em>DSAPI.<\/em>exe program, which in turn starts pcdrwi.exe. Both processes then run with the authorization level SYSTEM. Next, the service runs numerous PC Doctor programs that collect information about the computer's operating system and hardware. These executable files are actually normal PE files, but have a different extension &#8211; \"p5x\". <\/p>\n<p>All these executables load DLL libraries that have the ability to collect information from various sources (software and hardware). After the libraries were loaded, the security researchers discovered the following via ProcMon: <\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20210115233135\/https:\/\/safebreach.com\/get\/files\/image\/galleries\/sb2.png\"><img loading=\"lazy\" decoding=\"async\" title=\"\" alt=\"Aufgerufene Prozesse\" src=\"https:\/\/web.archive.org\/web\/20210115233135\/https:\/\/safebreach.com\/get\/files\/image\/galleries\/sb2.png\" width=\"608\" height=\"122\"><\/a><br \/>(<a href=\"https:\/\/web.archive.org\/web\/20210115233135\/https:\/\/safebreach.com\/get\/files\/image\/galleries\/sb2.png\" target=\"_blank\" rel=\"noopener noreferrer\">Click to zoom<\/a>) <\/p>\n<p>Three of the p5x executables attempt to call the following DLL files in the c:\\python27 branch (located in the PATH environment variable): <\/p>\n<ul>\n<li>LenovoInfo.dll\n<li>AlienFX.dll\n<li>atiadlxx.dll\n<li>atiadlxy.dll<\/li>\n<\/ul>\n<p>At this point you don't really need to read any more &#8211; because this construction, which almost is a notorious case for DLL hijacking, I have discussed in various blog posts in a different context. Stefan Kanthak has found this construct, which is a potential vulnerability, in many software packages and provided me with a test bed to detect such vulnerabilities (calling dependent DLLs). Peleg Hadar, of SafeBreach Labs, writes that he examined the whole thing in a VM. This revealed serious beginner mistakes made by the developers of the PC Doctor tools.<\/p>\n<p>The c:\\python27 directory in the test environment had an ACL that allows any authenticated user to write files to this folder. This makes a privilege extension a breeze. This allows a normal user (and thus running malware) to store a DLL file in this folder. He only has to overwrite one of the DLL files mentioned above with his own DLL of the same name. As soon as the tools of the PC-Doctor are called, they execute the manipulated DLL with the permissions of SYSTEM. The DLL then has control over the system and can perform arbitrary actions. <\/p>\n<p>The SafeBreach Labs <a href=\"http:\/\/www.pc-doctor.com\/support\/index.php?option=com_content&amp;view=article&amp;id=7:toolbox&amp;catid=9:solutions&amp;Itemid=117\">article<\/a> ontains further analyses that explain the internal structure of the PC Doctor tools. Basically, however, all of this can be reduced to: The whole software is big crap and should be uninstalled from the system pronto. At the end of th eSafeBreach Labs&nbsp; article other affected software products like CORSAIR Diagnostics, Tobii I-Series Diagnostic Tool etc. are also mentioned. <\/p>\n<p>Blog reader Al-CiD sent me the link to a Dell security alert on Sunday. DSA-2019-084: Dell SupportAssist for Business PCs and Dell SupportAssist for Home PCs Security Update for PC Doctor Vulnerability describes the CVE-2019-12280 vulnerability. This vulnerability has been classified as High in terms of threat level and affects the following Dell software. <\/p>\n<ul>\n<li>Dell SupportAssist for Business PCs version 2.0\n<li>Dell SupportAssist for Home PCs version 3.2.1 und vorherige Versionen<\/li>\n<\/ul>\n<p>Dell states that subsequent versions of Dell SupportAssist for Business Systems and Dell SupportAssist for Home PCs provide a solution to the problem:<\/p>\n<ul>\n<li>Dell SupportAssist f\u00fcr Business-PCs Version 2.0.1\n<li>Dell SupportAssist f\u00fcr Heim-PCs Version 3.2.2.2<\/li>\n<\/ul>\n<p>Dell recommends all customers to perform updates (auto update or manual update) as quickly as possible. The <a href=\"https:\/\/thehackernews.com\/2019\/06\/dells-supportassist-hacking.html\">Hacker News<\/a> have also published articles on the topic. My recommendation is to uninstall this software and left this snake oil from the system as soon as possible (if possible). Background of this statement: Once I have never needed anything like this on my systems before. Secondly, I assume that the ACL settings have simply been adjusted in such a way that access to the folder is no longer possible for every user. Which vulnerabilities (also with regard to DLL hijacking) still left is unclear. Only recently Dell had to update the SupportAssist because of a remotely exploitable vulnerability.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]PC-Doctor SupportAssist, which is pre-installed on many Dell systems, has a serious security vulnerability that allows permissions to be exploited. The component is also found in products from Corsair, Staples and Tobi. Dell has released an update.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,1547,2],"tags":[],"class_list":["post-10250","post","type-post","status-publish","format-standard","hentry","category-security","category-software","category-windows"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/10250","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=10250"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/10250\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=10250"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=10250"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=10250"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}