Dell dbutil 2 3.sys Driver Vulnerabilty

Revision as of 13:43, 6 May 2021 by Steve410 (talk | contribs) (Created page with "INTRO We have been informed of a security vulnerability dealing with a Dell driver called dbutil_2.3.sys which affects many Dell systems. You can read more about the vulner...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

INTRO

We have been informed of a security vulnerability dealing with a Dell driver called dbutil_2.3.sys which affects many Dell systems.

You can read more about the vulnerability here:

https://www.engadget.com/dell-driver-vulnerability-affects-hundreds-of-millions-of-p-cs-122028649.html

That vulnerability needs to be removed. To do so requires a driver update. It's one you should be able to do yourselves.

Installing The Update

Identify Your Dell Service Tag

Before you can install the update, you first need your Dell Service Tag. The Dell Service Tag number can generally be found on a sticker somewhere on your Dell laptop (usually on the underside) or desktop (usually on the back.)

However... if you can't find your Service Tag #, then follow these steps:

  • Find the search bar on the bottom left of your Windows screen.
  • Type in: cmd and hit Enter.

Up pops the Command Prompt window.

  • Type in: wmic bios get serial number and hit enter.

If all works as it should, now you have your Service Tag #

Next step... access and install the security update:

Visit the following URL:

 https://www.dell.com/support/home/en-us/drivers/driversdetails?driverid=7PR57


Once there, on the right of the page, click the box with Enter Details

When the box opens asking for your Service Tag, enter the Service Tag # you located earlier.


After you put the Service Tag number in you should be taken to the download page.

Click the blue Download.


Go to the download location, which will differ depending on the browser you are running and run the Dell-Security-Advisory-Update-DSA-2021-088_6DRPP5_Win_1.0.0_A01.EXE (this may be different for you.)


On my test machine this opened a dialog box which asked if you wanted to allow the app to run. Say yes (you may be prompted to put in your adm account info) and follow the questions to run the removal utility.


Hopefully that all works and your system is updated and protected.