Search for blog posts, documentation, or pages

Recently, Duo Labs security researchers found a few sketchy certificates on a Dell Inspiron 14 laptop we purchased last week to conduct a larger research project. And we weren’t the only ones - a reddit thread and some Twitter noise prompted us to share our observations and the real-world impact of our findings.

eDellRoot

Download our research paper for the full technical breakdown of our findings.

Our Findings

  • There are two certificates found on Dell machines, including a trusted eDellRoot root certificate
  • In the wild, we identified that one of the systems using these certificates for providing web services over HTTPS was a SCADA (supervisory control and data acquisition) system
  • eDellRoot is shipped preinstalled with an associated private key, which is a pretty big mistake
  • Our research indicates that Dell is intentionally shipping identical private keys in other models
  • This means an attacker could sniff a Dell user’s web browsing traffic and manipulate their traffic to deliver malware
  • We also found another certificate mishap on our Dell machine - an Atheros Authenticode certificate also shipped with the Bluetooth software In the interest of full-disclosure, we are including the eDellRoot private key we identified and the entire Atheros certificate bundle with this post.

Real-World Impact

If a user was using their Dell laptop at a coffee shop, an attacker sitting on the shop’s wi-fi network could potentially sniff all of their TLS encrypted traffic, including sensitive data like bank passwords, emails, etc.

The attacker could also manipulate the user’s traffic, e.g., sending malware in response to requests to download legit software, or install automatic updates - and make it all appear to be signed by a trusted developer.

Bonus Round: Leaked Atheros Authenticode Certificates

eDellRoot was not the only certificate mishap we identified with our Dell machine. The Bluetooth management tools which ship with the machine included a file called ‘Verisign.pfx’ the name alone was pretty ominous.

Dell Verisign File

The .pfx archive required a password which took us all of 6 hours worth of sub-optimal cloud cracking to recover; the resulting password was: ‘t-span.’

Atheros Certificate

It turns out an Atheros signing certificate also shipped with the Bluetooth management software! It’s the certificate used to sign four of the Bluetooth drives that shipped with the install:

btath_hcrp.sys
btath_lwflt.sys
btath_pan.sys
bthathfax.sys

Thankfully, this certificate expired on 3/31/2013 making it less prone to potential abuse. However, it appears that this certificate was in circulation while it was still valid (at least 11 days from what we can tell).

That means anything that was signed and timestamped prior to the certificate expiring could be valid. The earliest driver version that we could identify with this certificate was released on March 19, 2013 with the “Dell Wireless 1601,10.0.0.227, A00 Driver” version 11.22.54.596.

Remediation for eDellRoot

We are unsure what Dell Foundation Services (DFS) actually does on a Dell systems, however, Dell has a vague description here and a Dell support forum also contains this overly vague and unhelpful response from Dell.

Dell DFS

Many people have indicated that removing the eDellRoot certificates from the root and personal certificate stores is sufficient to protect users. This is not entirely accurate; you must remove the eDell plugin entirely or the certificate will be reinstalled whenever it is loaded.

This can be accomplished by deleting the ‘Dell.Foundation.Agent.Plugins.eDell.dll’ module from the system. Failure to do so may result in continued exposure to this security flaw.

An alternate remediation could also be as follows, however, we recommend that this be only performed by qualified professionals:

Lighter Fluid, or Security Remediation

Note that if you ever perform a factory reset on your Dell system, this certificate and the eDell plugin will be restored to the system and you will have to manually remove it again.

Conclusion

This highlights a disturbing trend among original equipment manufacturer (OEM) hardware vendors. Tampering with certificate stores exposes users to unnecessary, increased risk.

Tampering with the certificate store is a questionable practice, and OEM’s need to be careful when adding new trusted certificates, especially root certificates. Sadly, OEM manufacturers seem to not be learning from historical mistakes and keep making them over and over.

We look forward to engaging with the security community as a whole to get to the bottom of this to help protect affected Dell customers, and we look forward to more care and consideration on the part of OEMs when deciding to customize certificate stores.

Watch this blog for more on this and other issues like it from Duo Labs in the near future.

Download our research paper for the full technical breakdown of our findings.

Darren Kemp
Security Researcher

Darren is a Security Researcher with the Duo Labs team bringing over a decade of professional experience in the information security industry. Darren specializes in vulnerability, malware analysis and software reverse engineering. Prior to Duo Darren held roles in application security consulting, threat intelligence, and helped develop advanced crash dump analysis tools. He is also that guy with the 'ginger' badge at REcon.

Categories

Free Guide

Two-Factor Authentication Evaluation Guide

This guide walks through some of the key areas of differentiation between two-factor authentication solutions and provides some concrete criteria for evaluating technologies and vendors.

Tags

phishing (20)  two-factor-authentication (18)  security news (17)  healthcare security (16)  passwords (15)  weekly ink (13)  cloud security (12)  mobile security (11)  federal cybersecurity (10)  malware (10)  infosec-evolution (9)  banking security (8)  rsac2015 (8)  duo mobile (8)  retail data breaches (8)  stolen credentials (7)  financial data breach (7)  stolen-passwords (7)  data breaches (7)  financial institutions (6)  remote access security (6)  remote access attacks (6)  encryption (6)  pci dss (6)  ooba (6)  ios security (6)  2fa (6)  uk security (5)  platform edition (5)  media security (5)  pos malware (5)  higher education (5)  webinar (5)  atms (5)  transaction-level 2fa (5)  rig exploit kit (4)  vulnerability (4)  healthcare cybersecurity (4)  third-party security (4)  endpoint security (4)  healthit (4)  hipaa (4)  retail data security (4)  blackhat 2015 (4)  2-factor-authentication (4)  retail (4)  data breach notification (4)  security research (4)  google (4)  bank security (4)  defcon-23 (4)  financial data security (4)  medical identity theft (4)  security threats (4)  ios (4)  retail data risks (3)  retail ebook (3)  ios vulnerabilities (3)  payment card breach (3)  hipaa security rule (3)  health it (3)  law firm security (3)  flash security (3)  critical infrastructure security (3)  out of band authentication (3)  ssl (3)  car security (3)  manufacturing security (3)  otp bypass (3)  flash vulnerabilities (3)  windows security (3)  ffiec (3)  end-user authentication (3)  defcon (3)  byod (3)  dyre trojan (3)  iot security (3)  target (3)  social engineering (3)  anthem (3)  outlook-web-app (3)  twitter (3)  stock market (3)  e-prescriptions (3)  defense in depth (3)  aws security (3)  home depot (3)  two-factor (3)  cisco vpn (3)  strong-authentication (3)  duo-security-summit (3)  healthcare data breach (3) 

Duo is hiring!

View our open positions

Subscribe to our Newsletter

Get product updates, interesting content, and invitations to online and live events.