CVE-2024-39584: Dell BIOS Flaw Exposes Systems to Secure Boot Bypass and Arbitrary Code Execution
In a recent security advisory, Dell disclosed a high-severity vulnerability, identified as CVE-2024-39584, affecting the BIOS of several popular Dell client platforms. This vulnerability, carrying a CVSS score of 8.2, stems from the use of default cryptographic keys in the BIOS, which can be exploited by a highly privileged attacker with local access. The consequences of such an exploitation are grave, including the bypass of Secure Boot protections and the execution of arbitrary code on the affected system.
The affected systems span a wide range of Dell’s product lineup, particularly in the Alienware series, which includes the Alienware Area 51m R2, Aurora R15 AMD, and multiple versions of the Alienware m15, m17, x14, x15, and x17 models. Dell has urged users of these systems to update their BIOS to the latest versions, which have been released to address this critical flaw.
Secure Boot is a crucial security feature designed to prevent unauthorized software from running during the system’s startup process. By bypassing Secure Boot, an attacker could potentially install malware, rootkits, or other malicious software that would be difficult to detect and remove. The vulnerability stems from the use of a default cryptographic key in the BIOS, which could be exploited by a determined attacker.
Dell has released BIOS updates to address the vulnerability for all affected systems. The updates are available for download from the Dell Support website. Users are advised to install the updates immediately to protect their systems from potential attacks.
For detailed instructions on how to update your system’s BIOS, please visit the respective support links provided by Dell.