Dell root CA Shenanigans
-
Updated to add at 1610 PT / 0010 GMT
According to an analysis [PDF] by Duo Security, a bundled plugin reinstalls the root CA file if it is removed. First, you must delete Dell.Foundation.Agent.Plugins.eDell.dll from your system (search for it) and then remove the eDellRoot root CA certificate.The cert, we're told, is used with the plugin for receiving cryptographically signed telemetry requests; said telemetry includes things like the machine's service tag, a seven-character serial number that identifies the computer model, if not the individual machine.
"This highlights a disturbing trend among original equipment manufacturer (OEM) hardware vendors. Tampering with certificate stores exposes users to unnecessary, increased risk," the Duo team – Darren Kemp, Mikhail Davidov, and Kyle Lady – wrote in their report.
"Tampering with the certificate store is a questionable practice, and OEM’s need to be careful when adding new trusted certificates, especially root certificates. Sadly, OEM manufacturers seem to not be learning from historical mistakes and keep making them over and over."
Also:
-
My question is, why do they need to do it this way? If the software is on the machine, why can't it collect the "allowed" data and just send it via SSL to the vendor?
-
@Dashrender said:
My question is, why do they need to do it this way? If the software is on the machine, why can't it collect the "allowed" data and just send it via SSL to the vendor?
The logical answer would be either that they are lazy or that getting the "allowed" data is not the point. Given the risks of getting caught, being lazy makes little sense. How could they think that they would get away with it at all.
-
Dell acknowledge the issue:
To get rid of the self-signed root certificate, Dell customers have the option of waiting for a software patch to be rolled out over the coming days, or downloading and running the fix themselves.