Advisory

Dell Alienware vulnerable to bypassing Secure Boot protections

Take action: This is not a panic mode flaw - it requires physical access or already having high privilege access to the machine to bypass Secure Boot. But such access is not impossible - either through malware on the computer or through theft or accessing unattended computers. So best to schedule a BIOS update of your Alienware.


Learn More

A high severity vulnerability in the Dell Client Platform BIOS, tracked as CVE-2024-39584 (CVSS score 8.2), has been discovered, which could allow attackers to hijack compromised systems.

The flaw, categorized as a "Use of Default Cryptographic Key" vulnerability, allows a high-privileged attacker with local access to bypass the Secure Boot mechanism and execute arbitrary code.  Attackers exploiting this vulnerability could potentially gain complete control over the affected devices

Dell has identified the following products as vulnerable, with specific BIOS versions requiring updates:

Alienware Models:

  • Area 51m R2: Versions prior to 1.29.0
  • Aurora R15 AMD: Versions prior to 1.15.0
  • m15 R3: Versions prior to 1.29.0
  • m15 R4: Versions prior to 1.24.0
  • m17 R3: Versions prior to 1.29.0
  • m17 R4: Versions prior to 1.24.0
  • x14: Versions prior to 1.21.0
  • x15 R1: Versions prior to 1.24.0
  • x15 R2: Versions prior to 1.22.0
  • x17 R1: Versions prior to 1.24.0
  • x17 R2: Versions prior to 1.22.0

Dell has released BIOS updates to mitigate this vulnerability. Users are urged to update their BIOS to the latest versions available on the Dell Drivers & Downloads site.

There are no alternative workarounds or mitigations available. Therefore, it is advised for users to apply these updates immediately to protect their systems from potential exploitation.

Dell Alienware vulnerable to bypassing Secure Boot protections