US 12,223,059 B2
Systems and methods for vulnerability proofing when configuring an IHS
Raveendra Babu Madala, Bangalore (IN); and Santosh Gore, Bangalore (IN)
Assigned to Dell Products, L.P., Round Rock, TX (US)
Filed by Dell Products, L.P., Round Rock, TX (US)
Filed on Oct. 21, 2022, as Appl. No. 18/048,469.
Prior Publication US 2024/0134998 A1, Apr. 25, 2024
Prior Publication US 2024/0232375 A9, Jul. 11, 2024
Int. Cl. G06F 21/57 (2013.01); G06F 9/455 (2018.01)
CPC G06F 21/577 (2013.01) [G06F 9/45558 (2013.01); G06F 2009/45587 (2013.01)] 20 Claims
OG exemplary drawing
 
1. An IHS (Information Handling System) comprising:
one or more CPUs utilizing one or more buses that connect to a plurality of hardware components of the IHS; and
a remote access controller supporting remote management of the Information Handling System (IHS), the remote access controller comprising a logic unit and a memory device having instructions stored thereon that, upon execution by the logic unit, cause the remote access controller to:
detect an application instance being launched using an application template comprising configurations for one or more of the plurality of hardware components of the IHS;
access a plurality of catalogs specifying known vulnerabilities of hardware components;
determine whether any of the one or more of the hardware component configurations in the application template are identified as vulnerable in one or more of the catalogs; and
prevent launching of the application until the hardware component configurations within the application template are modified to include no configurations with vulnerabilities identified in the plurality of catalogs.