• Home
  • News
  • Coins2Day 500
  • Tech
  • Finance
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
TechCybersecurity

Look Out for Major Security Problem in Dell Computers

Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
November 23, 2015, 7:21 PM ET
Key Speakers At The 2015 Dell World Conference
A Dell Inc. Latitude 12 Rugged Extreme laptop computer sits in a cube while operating under constant exposure to water at the 2015 Dell World Conference in Austin, Texas, U.S., on Wednesday, Oct. 21, 2015. Dell World gathers business leaders, technologists, developers and designers to share ideas, stories and practices that guide innovative thinking. Photographer: Matthew Busch/Bloomberg via Getty ImagesMatthew Busch—Bloomberg via Getty Images

Dell has sold computers preinstalled with a potential security vulnerability that makes it easy for hackers to hijack Internet connections and masquerade as trusted websites.

The problem in Dell’s case lies in a trusted root certificate—a notarized digital credential—called “eDellRoot” that a computer programmer named Joe Nord recently discovered on his Inspiron Series 5000 notebook. The digital certificate verifies that the website a computer user visits is, in fact, the intended one.

After Nord posted about his finding, another Dell customer tweeted that his device was also affected. “Holy cow,” the fellow Dell user, who had purchased an XPS 15 laptop, said in reply. “Yessir, we have the exact same certificate and private key.”

@jhnord Holy cow. Yessir, we have the exact same certificate and private key.

— Kevin Hicks (@rotorcowboy) November 22, 2015

Digital certificates use keys—long and complex secret codes—to sign and validate that encrypted Internet connections are secure. In Dell’s case, these certificate-specific keys are stored locally on at least two Dell laptop models, allowing savvy hackers to reverse engineer them. So, if a hacker is positioned in the correct spot on a network—between a user and an HTTPS-protected website, for instance—that attacker can pose as a legitimate website, steal sensitive user information (such as password or banking credentials), or snoop on a user’s browsing activity.

The problem appears to affect more laptops than those mentioned above, including the XPS 13 model, according to tech news site theVerge. Some Dell Inspiron desktop computers and Precision M4800 and Latitude laptop models are also impacted, reports Ars Technica.

In a post on Reddit, the second Dell customer writes that “this is a major security vulnerability that endangers all recent Dell customers.” He also provides technical instructions for users who seek to know whether their machines are affected.

Computer security expert Kenn White has also demonstrated how attackers can use the flaw to impersonate seemingly sound websites. In a screenshot, he shows how he was able to establish an encrypted connection to what is apparently an HTTPS-secured link to bankofamerica.com, but is in reality a webpage sporting a dog in a ski-mask. (He has also created a test for users to determine whether their machines are vulnerable here.)

Https://twitter.com/kennwhite/status/668845026697318403

The Firefox web browser, White noted, will issue a warning when it connects via Dell’s bogus security certificate, since the browser uses its own store of security certificates.

Christina-Marie Furtado, a Dell spokesperson, told Coins2Day that the company is telling customers how to remove the problematic certificate and that the company will eliminate them on its machines in the future. She said in an email that the certificate was “intended to provide a better, faster and easier customer support experience.”

“Unfortunately, the certificate introduced an unintended security vulnerability,” she continued. “To address this, we are providing our customers with instructions to permanently remove the certificate from their systems via direct email, on our support site or Technical Support. We are also removing the certificate from all Dell systems moving forward.”

The incident, which is still ongoing, recalls a problem that affected the Chinese PC-maker Lenovo earlier this year. The computer manufacturer had preinstalled advertising software called Superfish that intercepted Internet traffic and used a certificate with similarly trusted privileges to inject ads into users’ browsers. The security community reacted with outrage, lashing out at the company for approving such a vulnerable system. Lenovo said it would stop shipping the pre-installed software, and it promised to be more transparent about similar pre-installs in the future.

Coins2Day recently spoke to Dell’s chief security officer, John McClurg, who highlighted the importance of cybersecurity to the company’s strategy. He said that security is “what enables your program to sell at all.” (The conversation focused more on the firm’s enterprise market than its consumer one.)

Founder and CEO Michael Dell also recently came out strong against tech companies adding “backdoor” access in their products to users’ encrypted data for the benefit of governments and law enforcement investigations.

Follow Robert Hackett on Twitter at @rhhackett. Read his cybersecurity, technology, and business coverage here. And subscribe to Data Sheet, Coins2Day’s daily newsletter on the business of technology, where he writes a weekly column.

For more on Dell, watch the video below:

For more on Lenovo’s Superfish scandal, watch this video:

[fortune-brightcove videoid=4082549766001]

About the Author
Robert Hackett
By Robert Hackett
Instagram iconLinkedIn iconTwitter icon
See full bioRight Arrow Button Icon
Rankings
  • 100 Best Companies
  • Coins2Day 500
  • Global 500
  • Coins2Day 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Leadership
  • Success
  • Tech
  • Asia
  • Europe
  • Environment
  • Coins2Day Crypto
  • Health
  • Retail
  • Lifestyle
  • Politics
  • Newsletters
  • Magazine
  • Features
  • Commentary
  • Mpw
  • CEO Initiative
  • Conferences
  • Personal Finance
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Coins2Day Brand Studio
  • Coins2Day Analytics
  • Coins2Day Conferences
  • Business Development
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Coins2Day
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map

© 2025 Coins2Day Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Coins2Day Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.