News > Computers 30 30 people found this article helpful Latest Dell Security Patch Fixes Exploit in Over 300 Computer Models Both newer and older models dating back to 2009 are affected By Joshua Hawkins Joshua Hawkins Twitter Freelance Technology Reporter Full Sail University Josh Hawkins is a freelance writer for Lifewire who loves writing about the latest tech and gadgets that help make people’s lives easier. As an avid gamer and VR enthusiast, he also enjoys diving deep into the technology that helps bring those kinds of experiences to life. lifewire's editorial guidelines Updated on May 5, 2021 05:29PM EDT Fact checked by Rich Scherr Fact checked by Rich Scherr Twitter University of Maryland Baltimore County Rich Scherr is a seasoned technology and financial journalist who spent nearly two decades as the editor of Potomac and Bay Area Tech Wire. lifewire's fact checking process Tweet Share Email Tweet Share Email Computers Mobile Phones Internet & Security Computers & Tablets Smart Life Home Theater & Entertainment Software & Apps Social Media Streaming Gaming Dell has released a new security patch aimed at fixing a control vulnerability issue in over 300 Dell computer models released since 2009. The issue impacts a total of 380 Dell device models, according to Techspot, and would allow someone who has access to a computer with the exploit to gain escalated privileges and even kernel-level permissions. Essentially, if done, this would give that user full control of the laptop, allowing them to access any data stored on it. The issue originally was discovered by SentinelLabs, which reported it to Dell in December. This prompted Dell to create the fix, which it has now issued to all affected computers. Greg Rosenke / Unsplash Dell also detailed the issue in an official support document on its website. Based on this post, it looks like the file which contains the vulnerability, dbutil_2_3.sys, is installed on the susceptible systems when using firmware update utility packages like Dell Command Update, Dell Update, Alienware Update, and Dell Platform Tags. Because it's only installed when updating drivers, those who recently purchased computers on the list may not have the affected file installed on their system. If you have a computer included on the list, then it is recommended that you install the security patch as soon as possible, just to avoid any possible problems. The FAQs for the update say that in order to make use of the exploit, a user would have to gain access to your computer through malware, phishing, or being granted remote access in some way. Both Dell and SentinelLabs also say they have not seen any evidence of this particular vulnerability being exploited, despite being around since 2009. The company includes information on three ways to install the patch in its support post, though the easiest method—which uses notification solutions like Dell Command and Dell Update—won’t be available until May 10. Was this page helpful? Thanks for letting us know! Get the Latest Tech News Delivered Every Day Email Address Sign up There was an error. Please try again. You're in! Thanks for signing up. There was an error. Please try again. Thank you for signing up! Tell us why! Other Not enough details Hard to understand Submit