Two Dell laptop models are shipping with a Superfish-style certificate hack
31
Dell users may have a serious security problem on their hands, thanks to an unorthodox SSL certificate that comes pre-installed on a number of the company's laptops. The certificate is called eDellRoot, a programmer named Joe Nord, and because of Dell's pre-installed permissions, affected computers are set to trust any SSL certificate it signs.
The problem is, because the key is stored locally, it's likely that an attacker could create a forged version of the signing key, exposing users to all manner of SSL attacks. Users have found the certificate key on both the Inspiron 5000 and XPS 15 and The Verge was able to detect it on an XPS 13, suggesting it may be present on a significant portion of the Dell laptops currently on the market.
Reminiscent of Lenovo's Superfish scandal
It's reminiscent of a similar scandal that hit Lenovo in February, when the company was caught pre-installing an adware program called Superfish with a similar self-signed certificate. Dell's case is different, since there's no indication that the certificate is being used to plant ads on the laptops, but the resulting security problem is the same. To fix the issue, users will need to manually revoke the certificate permissions, a complex and technically demanding task.
Because the private key for the certificate is hosted on each computer, it would be simple for a technically adept criminal to reverse-engineer that signing key, using it to certify unsafe traffic as if it were legitimate. That power could be used attack to target Dell users logged onto a public Wi-Fi hotspot or target traffic from deeper in the network through a more sophisticated attack, harvesting credit card numbers, passwords, or other sensitive information.
In fact, some security researchers have already been able to exploit the bad certificates. Darren Kemp, a researcher at DuoSecurity, says the problem may be even more complex than Nord's first post suggests. "It appears that there is definitely more than one eDellRoot thumbprint as well as at least one other defunct private certificate on the system that we were able to crack the password on without substantial effort," Kemp said in a statement.
In the meantime, it's still unclear how many Dell computers are affected by the certificate problem, and why the self-signed certificate was included in the first place. In a statement to The Verge, a Dell representative said the company was still looking into the certificate, but emphasized Dell's policy of minimizing pre-loaded software for security reasons. "Customer security and privacy is a top concern for Dell," a representative said. "We have a team investigating the current situation and will update you as soon as we have more information."
3:00PM ET: Updated with statement from Duo Security.
Verge Video: Dell XPS 15 hands-on
- SourceJoe Nord
More from The Verge
- Neil deGrasse Tyson: 'The delusion is thinking that SpaceX is going to lead the space frontier'
- Black Friday 2015: the best gaming deals for PS4, Xbox One, Wii U, and PC
- The reusable space rocket is nearly here with Blue Origin’s first successful landing
- The Anonymous 'war on ISIS' is already falling apart
- Review: The Good Dinosaur sets a frustratingly familiar story in a thrillingly familiar world
- Xiaomi’s Mi Pad 2 is an iPad mini that runs Windows 10
- Mark Zuckerberg is starting his parenting career on the right note