Dell Responds To Concerns Regarding eDellroot Certificate

Dell-XPS-12-9250-1443724861-0-0

Yesterday, we reported about eDellRoot certificate installed on certain Dell laptops and PCs introduced a security vulnerability. Dell became aware of this issue and offered instructions to remove it. Dell has now responded to this in a blog post saying that this certificate was installed in their PCs to quickly identify the computer model, making it easier and faster to service our customers. However, they will remove it going forward.

Today we became aware that a certificate (eDellRoot), installed by our Dell Foundation Services application on our PCs, unintentionally introduced a security vulnerability. The certificate was implemented as part of a support tool and intended to make it faster and easier for our customers to service their system. Customer security and privacy is a top concern and priority for Dell; we deeply regret that this has happened and are taking steps to address it.

The certificate is not malware or adware. Rather, it was intended to provide the system service tag to Dell online support allowing us to quickly identify the computer model, making it easier and faster to service our customers. This certificate is not being used to collect personal customer information. It’s also important to note that the certificate will not reinstall itself once it is properly removed using the recommended Dell process.

We have posted instructions to permanently remove the certificate from your system here. We will also push a software update starting on November 24 that will check for the certificate, and if detected remove it. Commercial customers who reimaged their systems without Dell Foundation Services are not affected by this issue. Additionally, the certificate will be removed from all Dell systems moving forward.

Learning from the mistake Lenovo did few months back, Dell was quick to respond on this serious issue avoiding confusion.

Some links in the article may not be viewable as you are using an AdBlocker. Please add us to your whitelist to enable the website to function properly.

Source Related
Comments