Dell Patches Highly Vulnerable Firmware Update Driver Impacting Hundreds and Millions of Laptops, Desktops

The issues exist in Dell’s firmware update driver version 2.3 (dbutil_2_3.sys) module that is not just limited to Dell machines but is also some Alienware models.

Advertisement
By Jagmeet Singh | Updated: 5 May 2021 12:01 IST
Highlights
  • Dell’s firmware update driver module is found to have five severe flaws
  • SentinelLabs discovered and reported the flaws in December 2020
  • Dell has released the patch for over 380 laptop and desktop models

Dell users are highly recommended to install the patch on their machines

Dell has released a security patch for its firmware update driver module that carried as many as five high-severity flaws that are impacting potentially hundreds and millions of its desktops, laptops, notebooks, and tablets based on Windows. The firmware update driver module in question has been in use since at least 2009 and is available even on the latest Dell machines. This means that the serious vulnerabilities have remained undisclosed for not less than 12 years. The bugs could allow attackers to bypass security and gain kernel-level permissions to execute code and even move from one device to another by gaining access to an organisation's network.

According to Dell, the vulnerable driver module is not available pre-installed on its machines and is available only once you have applied a BIOS, Thunderbolt, TPM, or dock firmware update to your system.

Dell also sent this statement to Gadgets 360: "We remediated a vulnerability (CVE-2021-21551) in a driver (dbutil_2_3.sys) affecting certain Windows-based Dell computers. We have seen no evidence this vulnerability has been exploited by malicious actors to date. We encourage customers to review the Dell Security Advisory (DSA-2021-088) and follow the remediation steps as soon as possible. We've also posted an FAQ for additional information. Thanks to the researchers for working directly with us to resolve the issue."

Advertisement

Threat intelligence firm SentinelLabs discovered the issues that exist in Dell's firmware update driver version 2.3 (dbutil_2_3.sys) module. The same module is not just limited to Dell machines but also some Alienware gaming laptops and desktops. SentinelLabs also cautioned that the vulnerable driver module could still be used in a BYOVD attack as Dell did not revoke the certificate while releasing the patch.

Advertisement

Gadgets 360 has reached out to Dell for further clarification.

One of the first issues in the firmware update driver module is that it accepts Input/ Output Control (IOCTL) requests without any Access Control (ACL) requirements.

Advertisement

“Allowing any process to communicate with your driver is often a bad practice since drivers operate with the highest of privileges; thus, some IOCTL functions can be abused ‘by design',” SentinelLabs researcher Kasif Dekel said.

The driver module is also found to allow execution of In/ Out (I/O) instructions in kernel mode with arbitrary operands (LPE #3 and LPE #4). This in simpler terms means that one could interact with peripheral devices such as the HDD and GPU to either read or write directly to the disk by bypassing all security mechanisms in the operating system.

Advertisement

Additionally, the driver file itself is found to be located in the temporary folder of the operating system. SentinelLabs calls it a bug in itself and believes that it opens the door to other issues.

“The classic way to exploit this would be to transform any BYOVD (Bring Your Own Vulnerable Driver) into an Elevation of Privileges vulnerability since loading a (vulnerable) driver means you require administrator privileges, which essentially eliminates the need for a vulnerability,” the researcher noted.

Dell is aware of the issues reported by SentinelLabs since December 2020 and has tracked them as CVE-2021-21551. The vulnerabilities also carry CVSS vulnerability-severity rating of 8.8 out of 10. However, both Dell and SentinelLabs note that they haven't noticed any evidence of the vulnerabilities being exploited in the wild.

For all the affected machines, Dell has released the patch that users are highly recommended to install from their end through the Dell or Alienware Update utility. The company has also provided a list of models that are being stand vulnerable due to the bugs. The list includes over 380 models and includes some of the popular Dell machines, such as the latest XPS 13 and XPS 15 notebooks as well as the Dell G3, G5, and G7 gaming laptops. There are also nearly 200 affected machines that are no longer eligible for an official service and include the Alienware 14, Alienware 17, and the Dell Latitude 14 Rugged Extreme.

This is not the first time when a severe security issue has been found on Dell machines. In 2019, the company patched a critical flaw in its SupportAssist tool that affected millions of its PC users globally. Another serious issue was found in the Dell System Detect program back in 2015 that also exposed a large number of its users to attack.


Is MacBook Air M1 the portable beast of a laptop that you always wanted? We discussed this on Orbital, the Gadgets 360 podcast. Orbital is available on Apple Podcasts, Google Podcasts, Spotify, and wherever you get your podcasts.

Affiliate links may be automatically generated - see our ethics statement for details.
 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Further reading: Dell, SentinelLabs, Alienware
Advertisement

Related Stories

Popular Mobile Brands
  1. iQOO Neo 11 With Snapdragon 8 Elite SoC Launched: Price, Specifications
  2. Top OTT Releases of the Week: Kantara Chapter 1, Lokah Chapter 1, Idli Kadai, and More
  3. Gemini 3 AI Model Will Be Released Soon, Says Google CEO Sundar Pichai
  4. Realme GT 8 Pro Will Launch in India in November With This Chipset
  5. Vivo X300 Series Launching Today: Everything You Need to Know
  6. Reliance Offers Free 18-Month Google AI Pro with Gemini, Veo to Jio Users
  7. How to Claim 18 Months of Free Google AI Pro Access on the MyJio App
  8. Samsung Galaxy S26 Series Teased to Launch With These Notable Upgrades
  9. Snapdragon 8 Gen 5 Chipset Key Specs, Benchmarks Leak
  10. Vivo S50 Pro Mini Key Specifications Tipped Ahead of Launch
  1. Vivo X300 Series Launched Globally With 200-Megapixel Zeiss Camera, Up to 6.78-Inch Display: Price, Features
  2. Canva Introduces Revamped Video Editor, New AI Tools and a Marketing Platform
  3. Bitchat Becomes Jamaica’s Go-to App as Hurricane Melissa Cripples Communication
  4. Google Maps Is Reportedly Developing a New Power Saving Mode for Navigation
  5. Take-Two CEO Says AI Won't Be 'Very Good' at Making a Game Like Grand Theft Auto
  6. Reliance Users to Get Free Google AI Pro Access for 18 Months Worth Rs. 35,100 With Gemini, Veo Features
  7. Meta’s VR Headsets and AI Glasses Cost the Company $4.4 Billion in Q3 2025
  8. iQOO Neo 11 With 7,500mAh Battery, Snapdragon 8 Elite Chip Launched: Price, Specifications
  9. Telegram Founder Pavel Durov Launches Cocoon, a Decentralised AI Project on TON
  10. Hedda (2025) Now Available for Streaming on Amazon Prime Video: What You Need to Know
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.