<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/"><channel><title><![CDATA[Dell - Shodan Blog]]></title><description><![CDATA[The latest news and developments for Shodan.]]></description><link>https://blog.shodan.io/</link><generator>Ghost 0.7</generator><lastBuildDate>Sun, 12 Apr 2026 02:09:56 GMT</lastBuildDate><atom:link href="https://blog.shodan.io/tag/dell/rss/" rel="self" type="application/rss+xml"/><ttl>60</ttl><item><title><![CDATA[All About Dell]]></title><description><![CDATA[<p>Dell has been hit with 2 security issues the past few days. I wanted to quickly summarize my findings from an external network perspective:</p>

<h6 id="1laptopscomepreinstalledwitharootcertificate">1. Laptops come pre-installed with a root certificate</h6>

<p><a href="https://blog.hboeck.de/archives/876-Superfish-2.0-Dangerous-Certificate-on-Dell-Laptops-breaks-encrypted-HTTPS-Connections.html">https://blog.hboeck.de/archives/876-Superfish-2.0-Dangerous-Certificate-on-Dell-Laptops-breaks-encrypted-HTTPS-Connections.html</a></p>

<p>The root certificate is issued by <strong>eDellRoot</strong>. Initially, the story</p>]]></description><link>https://blog.shodan.io/all-about-dell/</link><guid isPermaLink="false">930580ab-11dd-414d-92c7-006e569db883</guid><category><![CDATA[SSL]]></category><category><![CDATA[research]]></category><category><![CDATA[Dell]]></category><dc:creator><![CDATA[John Matherly]]></dc:creator><pubDate>Thu, 26 Nov 2015 05:12:18 GMT</pubDate><media:content url="http://blog.shodan.io/content/images/2015/11/screenshot-maps-shodan-io-2015-11-25-23-01-05.png" medium="image"/><content:encoded><![CDATA[<img src="http://blog.shodan.io/content/images/2015/11/screenshot-maps-shodan-io-2015-11-25-23-01-05.png" alt="All About Dell"><p>Dell has been hit with 2 security issues the past few days. I wanted to quickly summarize my findings from an external network perspective:</p>

<h6 id="1laptopscomepreinstalledwitharootcertificate">1. Laptops come pre-installed with a root certificate</h6>

<p><a href="https://blog.hboeck.de/archives/876-Superfish-2.0-Dangerous-Certificate-on-Dell-Laptops-breaks-encrypted-HTTPS-Connections.html">https://blog.hboeck.de/archives/876-Superfish-2.0-Dangerous-Certificate-on-Dell-Laptops-breaks-encrypted-HTTPS-Connections.html</a></p>

<p>The root certificate is issued by <strong>eDellRoot</strong>. Initially, the story mentioned just one certificate but it quickly became clear that there was a 2nd certificate that can be found on live web servers using <a href="https://www.shodan.io/search?query=ssl%3Aedellroot">Shodan</a> with the search query:</p>

<pre><code>ssl:eDellRoot
</code></pre>

<p>At the moment, the search returns 28 results that are <a href="https://www.shodan.io/report/JpMAZMji">located mostly in the US</a> with a few in Switzerland, Canada, Singapore and Malaysia:</p>

<p><img src="https://pbs.twimg.com/media/CUi6RGCU8AEirOs.png:large" alt="All About Dell"></p>

<p>Even though there are very few results, at least one of them has turned out to be a control system. This isn't a big surprise since there are <a href="http://www.slideshare.net/BobRadvanovsky/project-shine-findings-report-dated-1oct2014">millions of control systems connected to the Internet</a> but it's a good reminder that the Internet has much more than just web servers.</p>

<p>Dell has <a href="http://en.community.dell.com/dell-blogs/direct2dell/b/direct2dell/archive/2015/11/23/response-to-concerns-regarding-edellroot-certificate">issued a statement</a> explaining the existence of the root certificate and released a tool/ instructions on how to remove it.</p>

<h6 id="2webserverrunsonport7779thatprovidesunauthenticatedaccesstothedellservicetag">2. Webserver runs on port 7779 that provides unauthenticated access to the Dell service tag</h6>

<p><a href="http://www.theregister.co.uk/2015/11/25/dell_backdoor_part_two/">http://www.theregister.co.uk/2015/11/25/dell<em>backdoor</em>part_two/</a></p>

<p>There are <a href="https://www.shodan.io/search?query=port%3A7779">~12,800 webservers</a> on the Internet running on port 7779. Out of those, roughly ~2,300 are running software that looks like it's from a Dell computer:</p>

<p><img src="https://blog.shodan.io/content/images/2015/11/screenshot-www-shodan-io-2015-11-25-22-23-06.png" alt="All About Dell"></p>

<p>I wrote a quick script to grab the service tags from those IPs and was able to collect ~1,000 service tags. The other 1,300 devices didn't respond in time or otherwise errored out when trying to query the information. Of course, much of the threat is the ability to execute Javascript to gather the information from localhost but I wanted to get a sense of how many are Internet-connected. I've also added port 7779 to Shodan so it will be possible to keep track of how the issue gets resolved over time.</p>]]></content:encoded></item></channel></rss>