Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-21551 PoC — Dell dbutil Driver 安全漏洞

Source
Associated Vulnerability
Title:Dell dbutil Driver 安全漏洞 (CVE-2021-21551)
Description:Dell dbutil Driver是美国戴尔(Dell)公司的一个应用软件。提供了戴尔公司设备的一个驱动程序。 Dell dbutil Driver 存在安全漏洞,该漏洞源于戴尔dbutil驱动程序dbutil 2 .sys中不正确的访问限制。以下产品及版本受到影响:DBUtil: 2.3 。
Description
Script to patch your domain computers about the CVE-2021-21551. Privesc on machines that have the driver dbutil_2_3.sys, installed by some DELL tools (BIOS updater, SupportAssist...)
Readme
# Description
Script to patch your domain computers about the CVE-2021-21551. Privesc on machines that have the driver dbutil_2_3.sys, installed by some DELL tools (BIOS updater, SupportAssist...). It uses WinRM to invoke the checks on every domain-member computers. Tries to clean the vulnerable drivers & fullfill a .txt list with status.

# Usage - Remote version
1. Just launch the script, it does the job :)  
`PS> ./CVE-2021-21551-remotefix.ps1`

// Make sure that your clients are accessible with WinRM (PSRemoting). //  
// Else not, you can modify the script to run locally by a scheduled task, pushed by GPO. //

# Usage - Local version
`PS> ./CVE-2021-21551-localfix.ps1`  
In case that you can't access to your domain computers with WinRM, you can push that script with a GPO scheduled task.  
It will execute the script locally, clean the driver(s) and notify results by e-mail.  

1. Update these these 3 args :  
![image](https://user-images.githubusercontent.com/41639163/122671545-7fef0500-d1c7-11eb-9824-5da55c78ef09.png)  

2. Create a GPO targeted to your computers to run the script
File Snapshot

[4.0K] /data/pocs/bd719f2e2affdcafb0a4accbc31331e0c3b88315 ├── [2.4K] CVE-2021-21551_localfix.ps1 ├── [4.1K] CVE-2021-21551-remotefix.ps1 └── [1.1K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.