BIOS update: Attackers can disable Secure Boot on Alienware notebooks

Under certain conditions, attackers can bypass a central protection function of Dell's Alienware notebooks.

Save to Pocket listen Print view
Stylized image: Search returns spam and malware

Alienware laptops are vulnerable due to a BIOS gap.

(Image: Bild erstellt mit KI in Bing Designer durch heise online / dmk)

1 min. read

Because the Dell Client Platform BIOS contains a static cryptographic key, attackers can compromise entire systems. According to the PC manufacturer, various laptop models in the Alienware series are at risk of this.

According to a warning message, the Area 51m R2, Aurora R15 AMD, m15 R3, m15 R4, m17 R3, m15 R4, x14, x15 R1, x15 R2, x17 R1 and x17 R2 models are specifically affected. The developers state that they have closed the vulnerability (CVE-2024-39584"high") in BIOS versions 1.21.0, 1.22.0, 1.24.0 and 1.29.0, depending on the model.

However, according to Dell, a local attacker already requires high user rights for a successful attack. If this is the case, he can deactivate the Secure Boot protection function and execute malicious code. Among other things, the function ensures that no manipulated operating systems start.

It is not yet known how attacks can take place in detail. In addition, the computer manufacturer has not yet provided any information on attacks that are already underway. There is also no information on how administrators can detect compromised PCs.

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.