{"id":1387,"date":"2019-05-02T09:25:25","date_gmt":"2019-05-02T01:25:25","guid":{"rendered":"https:\/\/tongwing.woon.sg\/blog\/?p=1387"},"modified":"2019-05-02T09:25:25","modified_gmt":"2019-05-02T01:25:25","slug":"remote-code-execution-on-most-dell-computers","status":"publish","type":"post","link":"https:\/\/tongwing.woon.sg\/blog\/remote-code-execution-on-most-dell-computers\/","title":{"rendered":"Remote Code Execution on most Dell computers"},"content":{"rendered":"<p>First it was <a href=\"https:\/\/tongwing.woon.sg\/blog\/lenovo-caught-installing-adware-on-new-computers\/\">Lenovo<\/a> and <a href=\"https:\/\/tongwing.woon.sg\/blog\/indrora-mind-deadupdate-or-how-i-learned-to-stop-worrying-and\/\">Asus<\/a>, now Dell has fallen as well. Goes to show that 1) you should uninstall crapware that comes pre-bundled with your Windows machine 2) writing secure software is hard.<\/p>\n<p><a href=\"https:\/\/d4stiny.github.io\/Remote-Code-Execution-on-most-Dell-computers\/\"><img decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/tongwing.woon.sg\/blog\/wp-content\/uploads\/2019\/05\/bEVfaii.png\" alt=\"\" \/><\/a><\/p>\n<blockquote><p>What computer do you use? Who made it? Have you ever thought about what came with your computer? When we think of Remote Code Execution (RCE) vulnerabilities in mass, we might think of vulnerabilities in the operating system, but another attack vector to consider is \u201cWhat third-party software came with my PC?\u201d. In this article, I\u2019ll be looking at a Remote Code Execution vulnerability I found in Dell SupportAssist, software meant to \u201cproactively check the health of your system\u2019s hardware and software\u201d and which is \u201cpreinstalled on most of all new Dell devices\u201d.<\/p><\/blockquote>\n<p>Source: <em><a href=\"https:\/\/d4stiny.github.io\/Remote-Code-Execution-on-most-Dell-computers\/\">Remote Code Execution on most Dell computers<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>First it was Lenovo and Asus, now Dell has fallen as well. Goes to show that 1) you should uninstall crapware that comes pre-bundled with your Windows machine 2) writing secure software is hard. What computer do you use? Who made it? Have you ever thought about what came with your computer? When we think [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[16,10],"tags":[],"_links":{"self":[{"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/posts\/1387"}],"collection":[{"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/comments?post=1387"}],"version-history":[{"count":1,"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/posts\/1387\/revisions"}],"predecessor-version":[{"id":1389,"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/posts\/1387\/revisions\/1389"}],"wp:attachment":[{"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/media?parent=1387"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/categories?post=1387"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/tags?post=1387"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}