US 12,189,784 B2
Systems and methods for vulnerability proofing when generating IHS updates
Raveendra Babu Madala, Bangalore (IN); and Santosh Gore, Bangalore (IN)
Assigned to Dell Products, L.P., Round Rock, TX (US)
Filed by Dell Products, L.P., Round Rock, TX (US)
Filed on Oct. 19, 2022, as Appl. No. 18/047,738.
Prior Publication US 2024/0134994 A1, Apr. 25, 2024
Prior Publication US 2024/0232371 A9, Jul. 11, 2024
Int. Cl. G06F 21/57 (2013.01)
CPC G06F 21/577 (2013.01) 20 Claims
OG exemplary drawing
 
1. A system comprising:
an update system configured to:
receive an indication of an update comprising updated configurations for one or more hardware components of an IHS (Information Handling System);
query the IHS for a plurality of vulnerability proofing requirements for updates that modify configurations of hardware components of the IHS;
based on vulnerability proofing requirements received from the IHS, determine whether the updated configurations for the one or more hardware components of the IHS are identified as vulnerable in the one or more of catalogs specified in the vulnerability proofing requirements;
when the updated configurations are not identified in the plurality of catalogs, transmit the update to the IHS;
when one or more configurations from the update are identified in the plurality of catalogs specified in the vulnerability proofing requirements, terminate the update and notify the IHS of the terminated update; and
the IHS (Information Handling System) comprising:
one or more CPUs utilizing one or more buses that connect to a plurality of hardware components of the IHS;
a remote access controller supporting remote management of the Information Handling System (IHS), the remote access controller comprising a logic unit and a memory device having instructions stored thereon that, upon execution by the logic unit, cause the remote access controller to:
in response to the query from the update system, retrieve, from a persistent data storage of the IHS, the plurality of vulnerability proofing requirements for updates that modify configurations of the plurality of hardware components of the IHS;
transmit the vulnerability proofing requirements to the update system, wherein the vulnerability proofing requirements comprise one or more of catalogs of known vulnerabilities of hardware components.