Security vendor Malwarebytes has flagged the Dell System Detect tool as a potentially unwanted application after older versions of the program were found to put computers at risk.
Last month a security researcher named Tom Forbes warned that attackers can exploit a weakness in older versions of Dell System Detect to remotely install malware on computers when users visit specially crafted websites.
The program allows Dell's support website to automatically detect the service tags of users' PCs, so it can offer the corresponding drivers. The tool is offered for download when users click the "Detect Product" button on the website for the first time and continues to run in the background after installation.
Forbes reported the issue to Dell back in November and the company released a patched version of Dell System Detect on Jan. 9. However, it seems that many users have not yet updated and their computers are still at risk.
Moreover, the version released by Dell in January -- 6.0.9 -- did not completely fix the problem, researchers from F-Secure said Thursday in a blog post. In order to be secure, users need to install version 6.0.14, which also prevents the program from running automatically when the operating system starts, they said.
Data gathered by F-Secure through its products over the past two weeks showed that Dell System Detect is installed on at least 100,000 computers and only about 1 percent of them run the latest 6.0.14 version.
"We are continuing to investigate further issues and actions that may be necessary to protect our customers," the F-Secure researchers said.
On Friday, security vendor Malwarebytes announced that vulnerable versions of the program will now be detected as PUP.Vulnerable.DellSystemDetect by its products. In the antivirus industry PUP stands for potentially unwanted program.
"We at Malwarebytes are pretty sure there are a lot of folks that won't know about this vulnerability, so we decided to detect it for the sake of raising awareness," the company said in a blog post. "Vulnerable versions of this tool have been seen as early as mid 2012 though most likely even earlier, according to our sources so anyone with a Dell system purchased a few years ago should take special notice and run a scan ASAP."
The owners of Dell computers should either uninstall the tool or ensure that they're running the latest version by following the instructions on Dell's website.
Join the CIO New Zealand group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.