Millions of Dell, HP, and Lenovo PCs sitting ducks for firmware attacks

Hands typing on a laptop keyboard.
(Image credit: LightField Studios/Shutterstock)

"Millions" of laptops and desktops made by Dell, HP, Lenovo and other companies are vulnerable to attack, thanks to unsecured firmware used by the webcams, trackpads, USB hubs, Wi-Fi cards and other peripheral devices from third-party suppliers that are built into the PCs.

That's according to a report today (Feb. 18) from Oregon security firm Eclypsium, which said peripheral devices are often sitting ducks for malware that can change their firmware and create a backdoor into the computers. (Computers' own UEFI/BIOS firmware can also be hacked.)

"Once firmware on any of these components is infected using the issues we describe, the malware stays undetected by any software security controls," said the Eclypsium report. "These weaknesses are widespread across components in laptops and servers, offering multiple pathways for malicious attacks."

Unfortunately, many of these firmware issues can't be fixed with updates. And computer makers, peripheral makers and operating-system makers often pass the buck about who should take charge of this issue, leaving computer users naked in the crossfire.

If you're running a vulnerable machine -- and odds are that you are -- then the safest bet is to install and run some of the best antivirus software to try to catch any malware that could try to alter the peripheral firmware. Make sure the antivirus software scans USB drives as soon as they're plugged in.

Computers definitely at risk

Models proven to be vulnerable to these peripheral firmware flaws include: 

  • the Lenovo ThinkPad X1 Carbon (6th Gen) laptop which uses a vulnerable trackpad made by Synaptics that doesn't verify its own firmware updates
  • the HP Spectre x360 Convertible 13-ap0xxx laptop line, whose webcam is made by SunplusIT, also doesn't verify its firmware updates and can be hacked by malicious USB drives
  • and the Dell XPS 15 9560 laptop, whose Wi-Fi card, made by Rivet Networks and provisioned by Qualcomm, accepts unverified firmware updates even though Windows 10 goes through the trouble of verifying the updates before they're loaded. 

What you can, and can't, do about this

Lenovo told Eclypsium that it had no way to fix the trackpad issue in its current laptops. You'll just have to live with vulnerable trackpads. 

HP has created a patch for its webcam vulnerability, which you can download from HP's support website.

As for the Dell Wi-Fi chipset, Eclypsium notified both Microsoft and Qualcomm, who promptly tried to pass the buck to each other. 

Eclypsium dryly noted that "the responsibility remains unclear and as we have seen often goes unaddressed altogether." 

"Unfortunately, the problems posed by unsigned firmware are not easy to fix," Eclypsium said. "If the component wasn't designed to check for signed firmware, it often can't be fixed with a firmware update. 

"In many cases, the underlying problem in a device or product line can't be fixed at all, meaning that all of the devices in that product line will continue to be vulnerable throughout their lifetime."

Just the tip of the iceberg

Of course, those are only the specific models that Eclypsium happened to look at. Dozens, perhaps hundreds of other devices use at least one of those components. For example, our colleagues at Laptop Magazine told us that current Dell XPS 13 laptops use those Wi-Fi cards as well.

"Virtually every component within a device has its own firmware and its own potential for risk, including network adapters, graphics cards, USB devices, cameras, touchpads and trackpads, and more," Eclypsium says in its report. "Peripheral devices often lack the same security best practices that we take for granted in operating systems and in other more visible components, like the UEFI or BIOS." 

"These components have no way to validate that the firmware loaded by the device is authentic and should be trusted," the report adds. "An attacker could simply insert a malicious or vulnerable firmware image, which the component would blindly trust and run."

The NSA may have already exploited such problems

Weaknesses in peripheral problems aren't just academic. In 2015, Russian antivirus firm Kaspersky disclosed the existence of malware that altered the firmware of computer hard drives, including drives made by IBM, Maxtor, Seagate, Toshiba and Western Digital, allowing the attackers to build silent backdoors into the computers. 

This malware was part of a larger constellation of hacking tools that Kasperksy attributed to the Equation Group, one of several highly skilled, long-running state-sponsored teams developing malicious code. Kaspersky called the hard-drive reprogrammer "perhaps the most powerful tool in the Equation group's arsenal."

"This is an astonishing technical accomplishment and is testament to the group's abilities," Kaspersky added in its 2015 report.

Kaspersky has a policy of never attributing malware to a specific nation, but the Equation Group is widely believed to be working for, or to be an active part of, the U.S. National Security Agency.

"After the disclosure of the Equation Group's drive implants, many HDD and SSD vendors made changes to ensure their components would only accept valid firmware," Eclypsium says in today's report. "However, many of the other peripheral components have yet to follow suit."

Who's going to own this problem?

Microsoft can harden Windows, and Linux developers can harden Linux, against malware all they can, but operating-system improvements won't do much to stop other lines of attack through the hundreds of third-party peripherals built into laptops and desktops. 

The question is who should take responsibility -- the peripheral makers, the makers of the computers that buy and use the peripherals, or the OS makers? Eclypsium doesn't have the answer, but it puts the blame with the peripheral makers.

"Peripheral manufacturers have been slow to adopt the practice of signing firmware," the report notes, "leaving millions of Windows and Linux systems at risk of firmware attacks that can exfiltrate data, disrupt operations and deliver ransomware."

Macs are immune

Notice that Eclypsium doesn't mention Macs. That's because, according to the report, "Apple performs signature verification on all files in a driver package, including firmware, each time before they are loaded into the device, to mitigate this type of attack."

"In contrast," the report adds, "Windows and Linux only perform this type of verification when the package is initially installed."

There's a simple explanation for this security gap: Apple makes both its hardware and software and has a vested interest in making sure they complement each other perfectly. 

But Microsoft makes only a few devices running Windows, and Linux coders and distributors generally make no hardware at all. Both those OS's have to run on thousands of different hardware configurations and can't be expected to secure the firmware on just as many potential peripherals.

Someone needs to step up

Eclypsium hints that maybe the computer makers should take over where the peripheral makers slack off.

"Ultimately, the device itself needs to perform the signature verification before allowing the firmware update rather than depending on the operating system to perform this task," the report states.

TOPICS
Paul Wagenseil

Paul Wagenseil is a senior editor at Tom's Guide focused on security and privacy. He has also been a dishwasher, fry cook, long-haul driver, code monkey and video editor. He's been rooting around in the information-security space for more than 15 years at FoxNews.com, SecurityNewsDaily, TechNewsDaily and Tom's Guide, has presented talks at the ShmooCon, DerbyCon and BSides Las Vegas hacker conferences, shown up in random TV news spots and even moderated a panel discussion at the CEDIA home-technology conference. You can follow his rants on Twitter at @snd_wagenseil.

Read more
Windows
240 million Windows 10 users are vulnerable to six different hacker exploits — protect yourself now
Microsoft Surface Laptop 7
'AI laptops' hype is not what you think — PC makers won't like me revealing this secret
Eight Sleep Pod 4 Ultra with head raised in beige bedroom
Eight Sleep smart beds reportedly have a secret backdoor that can be accessed remotely — everything you need to know
A hacker typing quickly on a keyboard
Hackers are posing as Apple and Google to infect Macs with malware — don’t fall for these fake browser updates
Graphic of fibre optic cables attacking code
An estimated 46,000 VPN servers are vulnerable to being hijacked
How to disable the Windows key
Microsoft patches over 160 security flaws including 3 active zero days — update your PC right now
Latest in Online Security
23andME box
23andMe has declared bankruptcy — here's how to delete your data now
A magnifying glass on top of the Steam logo in a web browser
Valve just pulled a malicious game demo spreading info-stealing malware from Steam
A man filing his taxes electronically on a laptop
AI-powered tax scams are here - how to stay safe from deepfakes, phishing and more this tax season
MacBook Pro 2023
New Mac attack is tricking users into thinking their computer is locked — how to stay safe
Hacker using a stolen social security card
Your Social Security number is a literal gold mine for scammers and identity thieves — here’s how to keep it safe
An open lock depicting a data breach
Half a million teachers hit in major data breach with SSNs, financial data and more exposed — what to do now
Latest in News
iPhone 16 with Apple Intelligence logo for iOS 18.1
iOS 18.4: All the newest Apple Intelligence features coming to your iPhone
Maria Debska in "Just One Look" now streaming on Netflix
3 best Netflix shows in March you haven't watched yet
Split image featuring the Galaxy S25 Edge (left) and Galaxy S25 Ultra (right)
Samsung Galaxy S25 Edge just tipped for two Galaxy S25 Ultra-level features
Wolfenstein: The Old Blood
Amazon is giving away a ton of free games for its Big Spring Sale — here’s how to claim yours
A TV with the Netflix logo sits behind a hand holding a remote
Netflix is rolling out a big video quality upgrade — what you need to know
Choi Hyun-Wook, Hong Kyung, and Park Ji-hoon in "Weak Hero Class 1" now streaming on Netflix
This action-packed K-drama is now streaming on Netflix — and now’s the time to binge-watch before season 2