US 12,235,970 B2
Systems and methods for aggregated vulnerability proofing of an IHS
Raveendra Babu Madala, Bangalore (IN); and Santosh Gore, Bangalore (IN)
Assigned to Dell Products, L.P., Round Rock, TX (US)
Filed by Dell Products, L.P., Round Rock, TX (US)
Filed on Oct. 21, 2022, as Appl. No. 18/048,538.
Prior Publication US 2024/0135002 A1, Apr. 25, 2024
Prior Publication US 2024/0232379 A9, Jul. 11, 2024
Int. Cl. G06F 21/57 (2013.01)
CPC G06F 21/577 (2013.01) [G06F 21/575 (2013.01)] 20 Claims
OG exemplary drawing
 
1. An IHS (Information Handling System) comprising:
one or more CPUs utilizing one or more buses that connect to a plurality of hardware components of the IHS; and
a remote access controller supporting remote management of the Information Handling System (IHS), the remote access controller comprising a logic unit and a memory device having instructions stored thereon that, upon execution by the logic unit, cause the remote access controller to:
detect a proposed configuration of a first of the hardware components of the IHS,
access two or more catalogs specifying known vulnerabilities of hardware components, wherein a first of the catalogs comprises known vulnerabilities provided by a manufacturer of the first hardware component, wherein a second of the catalogs comprises known vulnerabilities provided by a manufacturer of the IHS;
determine whether the proposed configuration of the first hardware component is identified as vulnerable in the first catalog;
determine whether the proposed configuration of the first hardware component is identified as vulnerable in the second catalog; and
disable the first hardware component until the proposed configurations for the first hardware component are changed to include no configurations with vulnerabilities identified in the first catalog or in the second catalog.