Free technical content sponsored by SANS
Survey | 2025 SANS SOC Survey: Facing Top Challenges in Security Operations | The goal of this survey is to collect data and deliver a supporting white paper for those looking to establish a new SOC or increase the efficiency and effectiveness of an existing SOC. Complete the survey by March 24 for a chance to win a $400 Amazon gift card. https://www.sans.org/info/231585 | |
|
Microsoft Announces Majorana Quantum Processor Breakthrough
(February 19, 2025)
Microsoft has announced a quantum computing breakthrough in the development of its Majorana 1 chip. At issue is making qubits (quantum bits) as reliable as binary bits; qubits are more sensitive to noise and therefore susceptible to errors. Microsoft writes of their development: “Built with a breakthrough class of materials called a topoconductor, Majorana 1 marks a transformative leap toward practical quantum computing.” Majorana 1 will potentially comprise one million qubits on a single chip slightly larger than CPUs in desktops and servers.
Editor's Note
[Ullrich]
This new quantum processor design enabled quantum computing to “escape the research lab” and become a commercially available and affordable computing solution. Current commercial solutions, like D-Wave’s systems, address specific aspects of quantum computing and are rather limited in their applicability. Microsoft appears to have found an engineering solution to create scalable quantum computers, overcoming some of the current designs’ error rate problems and scalability issues. The “Quantum Crypto Deadline” of 2035 set by the federal government does appear to be much more realistic. Don’t let the ten-year timeline lead to delays and procrastination. The time to come up with a game plan is now. Cryptographic agility is critical. Do not lock yourself into a specific algorithm; find ways to inventory and adjust used algorithms as needed.
[Neely]
The big challenge with quantum computing is the error rate. Microsoft’s Majorana 1 is planned to have an error rate of 1 percent, which then leverages a logical qubit array called tetrons for error correction, making quantum computing practical. Even though this is still under development, it makes reference to behavior at absolute zero temperatures, and is a few years out; keep an eye on this space, this could be very exciting when realized.
Read more in:
- azure.microsoft.com: Microsoft unveils Majorana 1, the world’s first quantum processor powered by topological qubits
- www.theverge.com: Microsoft announces quantum computing breakthrough with new Majorana 1 chip
- www.technologyreview.com: A new Microsoft chip could lead to more stable quantum computers
- www.scworld.com: Microsoft claims quantum breakthrough with Majorana 1 computer chip | |
|
Signal’s Linked Devices Feature Phished by Russian Threat Actors
(February 19, 2025)
According to Google Threat Intelligence Group (GTIG), "Russia state-aligned threat actors" have been abusing a legitimate feature in the encrypted messaging app Signal that links devices using a QR code or URL, "allow[ing] one Signal account to be used on multiple devices, like a mobile device, desktop computer, and tablet." The threat actors trick a user into following a QR code or link under false pretenses -- appearing to be a security alert, a group invitation, or even part of a Ukrainian military application -- that actually links the victim's account to an instance controlled by the attacker, meaning "future messages will be delivered synchronously to both the victim and the threat actor in real-time." Signal has released an update designed to protect against this type of phishing attack by requiring authentication when linking devices, and by warning and checking in with users during and after the process. GTIG warns that threats to many messaging applications, including WhatsApp and Telegram, are intensifying, and recommends protective practices: lock mobile device screens using a complex password; ensure devices and apps are updated; enable Google Play Protect on Android devices and consider Lockdown Mode on iPhones; examine the "linked devices" list regularly; be wary of QR codes and links, especially if the context "urge[s] immediate action"; and implement MFA.
Editor's Note
[Ullrich]
Bad user interface designs are often as dangerous as buffer overflows and SQL injections. In this case, it is difficult for the user to distinguish “harmless” group chat invites from device pairing requests.
[Neely]
Be selective if you’re linking devices for any encrypted communication, as it increases the number of places which can decode private or sensitive information. Make sure any devices with these services have robust authentication, are kept updated and secure, logically and physically, to include ensuring apps are only loaded from the vendor or company App Store.
[Murray]
QR codes usually resolve to text, often to a link. They are more obscure than URLs and should always be suspect.
[Frost]
QR Codes are interesting. People can misunderstand the Desktop to Phone Features. Be careful with those features, and always look at what devices are hooked into your account.
Read more in:
- cloud.google.com: Signals of Trouble: Multiple Russia-Aligned Threat Actors Actively Targeting Signal Messenger
- www.wired.com: A Signal Update Fends Off a Phishing Technique Used in Russian Espionage
- arstechnica.com: Russia-aligned hackers are targeting Signal users with device-linking QR codes
- thehackernews.com: Hackers Exploit Signal's Linked Devices Feature to Hijack Accounts via Malicious QR Codes | |
|
OpenSSH Patches Flaws Allowing DoS and MitM Attacks
(February 18, 2024)
Researchers from the Qualys Threat Research Unit (TRU) have disclosed two vulnerabilities stemming from memory errors in OpenSSH. CVE-2025-26465, CVSS score 6.8, would allow an attacker to perform a Man-in-the-Middle (MitM) attack if the VerifyHostKeysDNS option is set to "yes" or "ask" -- notably, this flaw has been present since December 2014 in OpenSSH 6.8p1, and the vulnerable configuration was enabled by default in FreeBSD until March 2023. CVE-2025-26466, CVSS score 5.9, leaves the OpenSSH client and server vulnerable to pre-authentication Denial-of-Service (DoS) attacks. Both flaws have been patched in OpenSSH 9.9p2. OpenSSH is a critical and widely-used tool "which underpins many of the encrypted remote connections across Windows, Linux, and macOS, as well as secure file transfers," and is implemented in high-profile systems including "Facebook, Morgan Stanley, NetApp, Netflix, and Uber."
Editor's Note
[Ullrich]
The MitM vulnerability is interesting. The VerifyHostKeysDNS option is supposed to help verify server keys, but in this case, it turns out to be counterproductive. Please update if you rely on this option.
[Neely]
Beyond installing the updates to your SSH services when released, make sure you’re not exposing that service beyond what is needed, ideally only to validated/approved clients.
Read more in:
- blog.qualys.com: Qualys TRU Discovers Two Vulnerabilities in OpenSSH: CVE-2025-26465 & CVE-2025-26466
- www.theregister.com: FreSSH bugs undiscovered for years threaten OpenSSH security
- www.bleepingcomputer.com: New OpenSSH flaws expose SSH servers to MiTM and DoS attacks
- thehackernews.com: New OpenSSH Flaws Enable Man-in-the-Middle and DoS Attacks — Patch Now | |
|
|
|
|
Sponsored Links
Webcast | From Data to Decision: A Look into Babel Street’s Cutting-Edge OSINT Solutions February 24, 12:30 pm ET In this webcast, explore how Babel Street empowers commercial enterprises, defense, intelligence, and law enforcement to harness the full potential of multilingual data from public, commercial, and deep/dark web sources, including ultra rare, hard-to-reach sources. Save your seat today. https://www.sans.org/info/231590
Webcast | Securing the Future with Microsoft Defender for Cloud: Best Practices and Insights | March 26, 1:00 ET | Join Dave Shackleford, and Microsoft’s Dick Lake, as they explore practical approaches to securing cloud environments. Gain a deeper understanding of key areas such as cloud security posture management, DevOps security, and detection and response strategies—all tailored to help you future-proof your organization in an ever-changing threat landscape. Save your seat today. https://www.sans.org/info/231595
Webcast: March 4 at 1:00 ET | 2025 ICS Security Budget vs. Modern Risk Webcast: Optimizing Cybersecurity Investments for ICS/OT and Critical Infrastructure | Join Dean Parsons as he explores actionable insights into balancing security budgets with the unique needs and risks of ICS/OT systems in the face of escalating cyber threats. https://www.sans.org/info/231600 | |
|
|
Juniper Patches Critical Authentication Bypass in SSR
(February 11 & 18, 2025)
Juniper Networks has released a security advisory notifying users of a critical authentication bypass vulnerability affecting Session Smart Routers (SSR), Session Smart Conductors, and WAN Assurance Routers, which has now been patched. CVE-2025-21589, CVSS score 9.3, "may allow a network-based attacker to bypass authentication and take administrative control of the device" using an alternate path or channel. The flaw is fixed in SSR-5.6.17, SSR-6.1.12-lts, SSR-6.2.8-lts, SSR-6.3.3-r2 and later; devices that operate with WAN Assurance connected to the Mist Cloud will have been patched automatically.
Editor's Note
[Neely]
The flaw can be used to take administrative control of your Juniper Session Smart Router. There are no workarounds, and applying the fix will not impact the data functions of the router, but merely cause a brief outage of the management interface. Even better, no active exploitation has been detected yet, but that is expected to change with the release of the advisory, so get this update deployed.
Read more in:
- supportportal.juniper.net: 2025-02: Out-of-Cycle Security Bulletin: Session Smart Router, Session Smart Conductor, WAN Assurance Router: API Authentication Bypass Vulnerability (CVE-2025-21589)
- www.bleepingcomputer.com: Juniper patches critical auth bypass in Session Smart routers
- thehackernews.com: Juniper Session Smart Routers Vulnerability Could Let Attackers Bypass Authentication | |
|
Zero-Day Privilege Elevation Exploited in Microsoft Power Pages
(February 19 & 20, 2025)
Microsoft has published a security update disclosing the zero-day exploitation and subsequent patching of a high-severity vulnerability in Power Pages, the company's "low-code software as a service (SaaS) platform for creating, hosting, and administering modern external-facing business websites." CVE-2025-24989, CVSS score 8.2, allows unauthorized privilege elevation and possible bypass of user registration control via an improper access control vulnerability. The notice assesses the flaw as "Exploitation Detected," but provides no further details on the exploitation. Microsoft has already patched the service and notified customers who may have been affected, providing "instructions on reviewing their sites for potential exploitation and clean up methods."
Editor's Note
[Pescatore]
Apparently, this flaw was found by a Microsoft employee; I'd like to the think Microsoft's re-commitment will continue to increase the percentage of vulnerabilities found before attackers or external researchers discover them.
[Neely]
If you are using PowerPages, review your access logs, double checking for permission changes, double checking admin users to make sure all are expected, and enforcing MFA across all accounts.
[Murray]
Are you still using Microsoft software? | |
|
Update Xerox Firmware to Patch Pass-Back Flaws
(February 14 & 18, 2025)
Deral Heiland from Rapid7 has identified and disclosed two vulnerabilities, now both patched, in the firmware of Xerox Versalink C7025 Multifunction Printers (MFPs) affecting versions 57.69.91 and earlier. Both bugs are pass-back vulnerabilities: CVE-2024-12510 involves an attacker capturing clear text Lightweight Directory Access Protocol (LDAP) credentials given administrative access and access to the LDAP configuration settings; CVE-2024-12511 allows an attacker to capture SMB or FTP credentials by modifying the server's IP in the address book. Rapid7 notes that successful exploitation and access to Windows Active Directory could allow lateral movement within an organization's environment and lead to further compromises. Rapid7 disclosed these flaws to Xerox in March 2024, showing a timeline of ongoing check-ins with the company until they made patches available in January 2025 and opened disclosure in February 2025. Rapid7 recommends patching MFP firmware immediately, and if updating is not possible, to "set a complex password for the admin account ... avoid using Windows authentication accounts that have elevated privileges ... [and] avoid enabling the remote-control console for unauthenticated users."
Editor's Note
[Frost]
It turns out that some of the attacks I was showing in a presentation to some students have a name. Pass Back. Huh. I never knew that. Well. In the meantime, you should check for this; all printers do this, honestly.
[Dukes]
Attacking printers has been around for some time. What’s surprising, at least to me, is that it took ten months to issue a patch. Granted, an evildoer would need to have previously gained access to the network but still, a long time when the prize is collecting AD credentials without being detected.
[Neely]
Make sure printer firmware updates are being applied as religiously as your other endpoint updates. If you’ve outsourced printer management/maintenance, make sure their process aligns with your remediation timelines. SMB is used for scan to file services, so you probably need it, but you shouldn’t need FTP printer access. Beyond complex admin accounts, make sure that you have visibility to actions, logins, and configuration changes, and can detect any malicious behavior.
Read more in:
- www.rapid7.com: Xerox Versalink C7025 Multifunction Printer: Pass-Back Attack Vulnerabilities (FIXED)
- www.darkreading.com: Xerox Printer Vulnerabilities Enable Credential Capture
- thehackernews.com: New Xerox Printer Flaws Could Let Attackers Capture Windows Active Directory Credentials | |
|
Australian Fertility Provider Recovering from Data Breach
(February 18, 19, & 20, 2025)
Major Australian fertility services provider Genea published a statement on Wednesday, February 19, 2025, confirming that certain systems and servers have been taken offline during investigation of "suspicious activity" including an unauthorized third party's access to the company's data. Genea is still working to understand "the extent to which [the data accessed] contains personal information," and is communicating with any patients whose treatment schedule may be affected by the incident. The Australian Broadcasting Corporation (ABC) reports that Genea is "liaising with the Australian Cyber Security Centre," but that several clinics' phone lines were down five days before the statement was issued, and a number of patients have reported serious disruptions to their treatments as well as unavailability of the MyGenea app, used for tracking cycle and fertility data and viewing test results and forms. "Serious data breaches including leaks of identity, personal or financial information must be reported to the Office of the Australian Information Commissioner (OAIC) within 30 days."
Editor's Note
[Neely]
This is not their first incident, and they are not indicating there is a connection to last week’s phone service outage. Genea is attempting to maintain normal service levels while keeping their notification page updated, including providing contact information for patients who are unsure about what to do.
[Dukes]
One has to love lawyers: "suspicious activity…", "unauthorized third-party access…", "working to understand the extent…" Just call it what it is, a ransomware event where data was stolen/encrypted. A court will likely decide whether the provider exercised a ‘standard duty of care’ in protecting its patients’ data. And that rests on whether they had an established cybersecurity program and were reasonable in its implementation.
[Murray]
Perhaps "recovering" but never fully recovered.
Read more in:
- www.genea.com.au: 19 February 2025: Important update about a cyber incident
- www.abc.net.au: Major Australian IVF clinic Genea 'urgently investigating' cyber incident
- www.abc.net.au: Genea patients frustrated by lack of communication amid data breach
- therecord.media: Major Australian IVF provider investigating cyber incident
- techcrunch.com: Australian IVF giant Genea confirms hackers ‘accessed data’ during cyberattack | |
|
Hard Drives Purchased at Flea Market Contain Medical Data
(February 18, 29, & 20, 2025)
A Dutch man purchased 15 500GB hard drives at a flea market; when he examined them at home, he found they contained troves of medical data. The man initially purchased just five of the drives, but once he discovered the sensitive nature of the data they held, he returned to the flea market and purchased the rest of the seller’s drives from that batch, noting, "luckily they ended up with me and not with criminals." The medical data on the devices are from 2011 through 2019.
Editor's Note
[Frost]
I have seen many doctors' offices and small patient practices that struggle to keep up with patient care. You can see where they have a server or maybe several servers in a small closet, and when those services need to be disposed of, you must wonder how they are handling this. They may have just asked a 3rd party to dispose of the systems, and they may not have adequately done it. There are many ways this thing can happen. The result is that data handling is still a thing.
[Neely]
Make sure your decommissioning process includes data wipe, with a record, as well as a process for validation of some percentage to make sure it happens. With encryption, a cryptographic wipe has become faster and easier than prior overwriting processes. If you’re using a third party, they likely have options, including a solution for when the wipe process fails, such as shredding the device. Make sure all your media is covered by these processes, not just internal disks.
[Pescatore]
Just a good reminder to touch base with IT and make sure surplusing/disposing of any IT equipment (not just PCs) involves following well-known processes for sanitizing them.
[Dukes]
Your responsibility for protecting patient doesn’t stop once the IT equipment has been disposed of. Make sure you have a policy in place to wipe the hard drives as part of your equipment excessing process.
[Murray]
Valued by the replacement cost for a bit, these drives are not worth the compute power to erase them, much less the human effort to judge the value of any residual data. Best just to use a hammer.
Read more in:
- www.omroepbrabant.nl: Hard drives full of medical data sold at flea market
- nltimes.nl: Data leak: Breda man buys harddrives filled with medical data from flea market
- www.theregister.com: Hundreds of Dutch medical records bought for pocket change at flea market | |
|
CISA, FBI, and MS-ISAC Publish Ghost Ransomware Cybersecurity Advisory
(February 19 & 20, 2025)
The US Cybersecurity and Infrastructure Security Agency (CISA), the FBI, and the Multi-State Information Sharing and Analysis Center (MS-ISAC) have published a joint cybersecurity advisory to share known indicators of compromise (IoCs) and tactics, techniques, and procedures (TTPs) for Ghost (Cring) ransomware. The advisory recommends several actions to mitigate Ghost-related cyberthreats: “Maintain regular system backups stored separately from the source systems which cannot be altered or encrypted by potentially compromised network devices; Patch known vulnerabilities by applying timely security updates to operating systems, software, and firmware within a risk-informed timeframe; Segment networks to restrict lateral movement from initial infected devices and other devices in the same organization; and Require Phishing-Resistant MFA for access to all privileged accounts and email services accounts.” The document also lists seven CVEs the Ghost threat actors have been known to exploit: CVE-2018-13379, which affects Fortinet FortiOS appliances; CVE-2010-2861 and CVE-2009-3960, which affect servers running Adobe ColdFusion; CVE-2019-0604, which affects Microsoft SharePoint; and CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207, commonly referred to as the ProxyShell attack chain, which affects Microsoft Exchange.
Editor's Note
[Pescatore]
These advisories invariably could be one sentence long: "To keep your stakeholders safe from [insert attack type and name here] adopt the Center for Internet Security Critical Security Controls and prioritize reaching at least the Essential Cyber Hygiene levels." That would save a lot energy wasted by AI engines ingesting these long advisories...
[Dukes]
I’m starting to wonder if threat analysts are paid by the word. Just cut to the chase and implement Reasonable Cybersecurity, starting with Implementation Group 1 of the CIS Critical Security Controls. That’s more defensible in court than wading through a cybersecurity missive.
[Neely]
Get these IoCs to your threat hunters and make certain you’re clean here. Next make sure you’re updated for your Fortinet, SharePoint, Exchange and ColdFusion services. Now, check that you’re implementing the recommended ransomware mitigations above, ensuring none of those efforts are stalled or otherwise needing support to get to done.
[Frost]
This ransomware group was going after 2018 bugs from Fortinet and 2009/2010 bugs from Adobe ColdFusion. It made me wonder how successful they were, but given how much attention it has gotten, it also makes me wonder how much ColdFusion is still in the wild.
[Murray]
As a general rule system backups are a last resort measure. However, they are often cheaper than paying extortion, almost always cheaper than recreating from scratch, but usually more expensive than preventative measures such as strong authentication and network segmentation. | |
|
US House Working Group on Data Privacy
(February 12 & 18, 2025)
US Congressmen and committee chairmen Brett Guthrie (R-Kan.) and John Joyce (R-Md.) have announced the creation of a working group within the House Committee on Energy and Commerce aimed at discussing and developing legislation for a comprehensive "national data privacy standard." Eight other House Republicans will work with stakeholders in the stated interest of "protect[ing] Americans' rights online and ... [US] leadership in digital technologies, including artificial intelligence." MeriTalk notes that "there is no comprehensive Federal data privacy law, and 20 states have their own individual privacy laws."
Editor's Note
[Pescatore]
The US has a decades-long history of failing to pass meaningful national data privacy laws, generally because of the commercial world wanting to maintain easy access to and unencumbered use of personal information collected online. This has driven many states to pass their own laws. I hope the goal of this committee will be to set the federal data privacy bar at or near the high water mark established by some of the states, not to set a low bar to appease industry lobbying organizations.
[Neely]
This is a twofold problem: first, establishing a national standard, akin to CCPA or GDPR, and second, standing down individual state privacy laws, making it easier to implement and measure as well as assure consistency across the country. Hopefully this will be more successful than the 2022 American Data Privacy and Protection Act or 2024 American Privacy Rights Act which failed due to industry/technology pushback, particularly around lack of provisions preventing states from introducing additional privacy legislation, exacerbating the implementation problem.
[Dukes]
Glad to see, but a few years late. SEN Cantwell (D-WA) has been making the clarion call for a US National Privacy Standard and even introduced legislation in 2023 and 2024 (The American Privacy Rights Act). Perhaps 2025 is finally the year that Congress acts; I just wouldn’t hold my breath waiting.
[Murray]
At best the states have passed similar measures using different language, leaving compliance to the user. Having a single law may well make compliance easier. However, when Congress passes laws that pre-empt state laws, they often do so by setting compliance thresholds at the lowest level chosen by any state.
Read more in:
- energycommerce.house.gov: Chairman Guthrie and Vice Chairman Joyce Announce Creation of Privacy Working Group
- meritalk.com: House Republicans Form Task Force to Tackle Data Privacy Standards | |
|
Military Health Contractor Fined for Misrepresenting Cybersecurity Compliance
(February 18 & 19, 2025)
Between March 2015 and March 2018, US military healthcare administration contractor Health Net Federal Services (HNFS) allegedly violated its contract with the US Defense Health Agency (DHA) by failing to meet required cybersecurity standards and misrepresenting its compliance on annual reports. The DHA claims HNFS failed to scan for known vulnerabilities and remedy security flaws; ignored third-party cybersecurity auditors' reports covering many risks and policies; and "falsely attested ... compliance with at least seven of the NIST 800-53 security controls." During this time HNFS administered the TRICARE health plan covering military personnel and their families in 22 US states. A settlement agreement signed in the first week of February 2025 requires HNFS and its parent corporation, Centene, to pay the United States $11,253,400, admitting no liability.
Editor's Note
[Pescatore]
A good evaluation criteria for the management section of RFP evaluations is "Amount and number of fines paid in past 5 years, including ones where no culpability or liability was admitted."
[Neely]
This goes back to 2015, and is only now resulting in a fine, which compared to $162 billion of revenue in their last fiscal year, seems very slight. It is far better to report noncompliance and deal with the resulting audit finding/remediation than to falsely report compliance hoping to not be caught. If you’re struggling with regulatory requirements have a conversation with your auditors or regulators about ways they can be met, make sure you aren’t misinterpreting the requirements, then find a way to meet them.
Read more in:
- www.justice.gov: Settlement Agreement (PDF)
- www.justice.gov: Health Net Federal Services, LLC and Centene Corporation Agree to Pay Over $11 Million to Resolve False Claims Act Liability for Cybersecurity Violations
- www.theregister.com: Healthcare outfit that served military personnel settles allegations it faked infosec compliance for $11M
- therecord.media: Managed healthcare defense contractor to pay $11 million over alleged cyber failings | |
|
|
|
|
SANS Internet StormCast Friday, February 21, 2025
Kibana Queries; Mongoose Injection; U-Boot Flaws; Unifi Protect Camera Vulnerabilities; Protecting Network Devices as Endpoint (Austin Clark @sans_edu)
https://isc.sans.edu/podcastdetail/9334
Using ES|QL In Kibana to Query DShield Honeypot Logs
Using the "Elastic Search Piped Query Language" to query DShield honeypot logs
https://isc.sans.edu
Mongoose Flaws Put MongoDB at risk
The Object Direct Mapping library Mongoose suffers from an injection vulnerability leading to the potential of remote code execution in MongoDB
https://www.theregister.com
U-Boot Vulnerabilities
The open source boot loader U-Boot does suffer from a number of issues allowing the bypass of its integrity checks. This may lead to the execution of malicious code on boot.
https://www.openwall.com
Unifi Protect Camera Update
https://community.ui.com | |
XWorm Cocktail: A Mix of PE data with PowerShell Code
Quick analysis of an interesting XWorm sample with PowerShell code embedded inside an executable
https://isc.sans.edu
Microsoft's Majorana 1 Chip Carves New Path for Quantum Computing
Microsoft announced a break through in Quantum computing. Its new prototype Majorana 1 chip takes advantage of exotic Majorana particles to implement a scalable low error rate solution to building quantum computers
https://news.microsoft.com
Russia Targeting Signal Messenger
Signal is well regarded as a secure end to end encrypted messaging platform. However, a user may be tricked into providing access to their account by scanning a QR code masquerading as a group channel invitation.
https://cloud.google.com | |
ModelScan: Protection Against Model Serialization Attacks
ModelScan is a tool to inspect AI models for deserialization attacks. The tool will detect suspect commands and warn the user.
https://isc.sans.edu
OpenSSH MitM and DoS Vulnerabilities
OpenSSH Patched two vulnerabilities discovered by Qualys. One may be used for MitM attack in specfic configurations of OpenSSH.
https://www.qualys.com
Juniper Authentication Bypass
Juniper fixed an authentication bypass vulnerability that affects several prodcuts. The patch was released outside the normal patch schedule.
https://supportportal.juniper.net
DELL BIOS Patches
DELL released BIOS updates fixing a privilege escalation issue. The update affects a large part of Dell's portfolio
https://www.dell.com | |
|
|
|