Dell Alienware vulnerable to bypassing Secure Boot protections
Take action: This is not a panic mode flaw - it requires physical access or already having high privilege access to the machine to bypass Secure Boot. But such access is not impossible - either through malware on the computer or through theft or accessing unattended computers. So best to schedule a BIOS update of your Alienware.
Learn More
A high severity vulnerability in the Dell Client Platform BIOS, tracked as CVE-2024-39584 (CVSS score 8.2), has been discovered, which could allow attackers to hijack compromised systems.
The flaw, categorized as a "Use of Default Cryptographic Key" vulnerability, allows a high-privileged attacker with local access to bypass the Secure Boot mechanism and execute arbitrary code. Attackers exploiting this vulnerability could potentially gain complete control over the affected devices
Dell has identified the following products as vulnerable, with specific BIOS versions requiring updates:
Alienware Models:
- Area 51m R2: Versions prior to 1.29.0
- Aurora R15 AMD: Versions prior to 1.15.0
- m15 R3: Versions prior to 1.29.0
- m15 R4: Versions prior to 1.24.0
- m17 R3: Versions prior to 1.29.0
- m17 R4: Versions prior to 1.24.0
- x14: Versions prior to 1.21.0
- x15 R1: Versions prior to 1.24.0
- x15 R2: Versions prior to 1.22.0
- x17 R1: Versions prior to 1.24.0
- x17 R2: Versions prior to 1.22.0
There are no alternative workarounds or mitigations available. Therefore, it is advised for users to apply these updates immediately to protect their systems from potential exploitation.