US 12,169,568 B2
Systems and methods for vulnerability proofing when booting an IHS
Raveendra Babu Madala, Bangalore (IN); and Santosh Gore, Bangalore (IN)
Assigned to Dell Products, L.P., Round Rock, TX (US)
Filed by Dell Products, L.P., Round Rock, TX (US)
Filed on Oct. 19, 2022, as Appl. No. 18/047,687.
Prior Publication US 2024/0134992 A1, Apr. 25, 2024
Prior Publication US 2024/0232369 A9, Jul. 11, 2024
Int. Cl. G06F 21/57 (2013.01)
CPC G06F 21/577 (2013.01) [G06F 21/575 (2013.01)] 20 Claims
OG exemplary drawing
 
1. An IHS (Information Handling System) comprising:
one or more CPUs utilizing one or more buses that connect to a plurality of hardware components of the IHS; and
a remote access controller supporting remote management of the Information Handling System (IHS), the remote access controller comprising a logic unit and a memory device having instructions stored thereon that, upon execution by the logic unit, cause the remote access controller to:
detect a request to boot the IHS;
determine one or more boot configurations comprising configurations for operation of one or more of the plurality of hardware components of the IHS;
access a plurality of catalogs specifying known vulnerabilities of hardware components;
determine whether any of the one or more of the boot configurations are identified as vulnerable in one or more of the catalogs; and
restrict booting of the IHS until the boot configurations are modified to include no configurations with vulnerabilities identified in the plurality of catalogs.