Is Dell aware of the recent Kaspersky Lab report detailing a sophisticated attack that exploited the ASUS trusted update mechanism

摘要: The Dell response to the recent Kaspersky Lab report detailing a sophisticated attack that exploited the ASUS trusted update mechanism (Live Update Utility), for Dell Client systems, Dell EMC PowerEdge servers, and leveraged platforms. ...

本文章適用於 本文章不適用於 本文無關於任何特定產品。 本文未識別所有產品版本。

症狀


Question: Is Dell aware of the recent Kaspersky Lab report detailing a sophisticated attack that exploited the ASUS trusted update mechanism (live update utility)?

Answer: Yes. Dell is aware of the recent Kaspersky Lab report detailing a sophisticated attack that exploited the ASUS trusted update mechanism.

Dell wants to remind customers that we implement strong measures to protect the infrastructure and processes that are used to deliver products to customers. Our first priority is protecting customers and ensuring the security of their data and systems. To do this, Dell employs strong network security protection and monitoring mechanisms to prevent and detect unauthorized access to its infrastructure. We also use industry recognized secure code signing best practices to ensure the authenticity and integrity of Dell products and updates. Furthermore, Dell uses trusted and secure mechanisms to provide customers with updates to Dell products.

 
QNA44556_en_US__1icon NOTE: The answer and response in the article reflects the response for Dell Client, Dell EMC PowerEdge Servers as well as leveraged products.

原因

Not applicable.

解析度

Not applicable.

受影響的產品

Entry Level & Midrange, PowerVault
文章屬性
文章編號: 000068683
文章類型: Solution
上次修改時間: 18 4月 2026
版本:  6
向其他 Dell 使用者尋求您問題的答案
支援服務
檢查您的裝置是否在支援服務的涵蓋範圍內。