Dell has released updates for vulnerabilities in selected Dell Wyse Thin Client models. The patches fix a number of critical bugs that can be used remotely and without authentication.
The vulnerabilities were discovered by CyberMDX, which specializes in cybersecurity in the healthcare sector. More than 6,000 organizations, including many healthcare providers, use these Dell products in the US alone, according to the company.CyberMDX researchers noticed that the local FTP server used by Dell Wyse Thin Client to retrieve new firmware, packages and configurations is available by default without credentials, allowing anyone to access it.
Essentially, a hacker could access the INI file stored on the server and make changes to that file.
Such attacks were made possible by two vulnerabilities: CVE-2020-29491, which allows an unauthenticated attacker to gain access to the configuration file, and CVE-2020-29492, which allows changes to the file.
Dell advised its customers that the vulnerabilities affect Wyse 3040, 5010, 5040, 5060, 5070, 5470, and 7010 thin clients running ThinOS 8.6 and earlier.
The vulnerabilities were fixed with the release of ThinOS version 8.6 MR8.
Let me remind you that information security specialists also found a hidden backdoor in HP Device Manager.