Check for dangerous eDellRoot certificate

Dell laptops ship with a preinstalled root certificate and a private key. This is a very severe security risk and has the potential to compromise all encrypted HTTPS connections. This test will check whether you are vulnerable.

No bad eDell certificate found, you are not vulnerable.

Your browser allows connections to a host with a bad eDellRoot certificate.
You are vulnerable.

Your browser allows connections to a host with a bad DSDTestProvider certificate.
You are vulnerable.

Your browser seems to allow connections with any certificate.
This is unrelated to the Dell issue, but it is a severe security risk. If you haven't explicitely instructed your browser to accept untrusted certificates please get in touch with me, it may be related to a dangerous TLS interception device.

You may also want to check whether you are vulnerable to Superfish and Komodia issues and whether you are vulnerable to an Information disclosure of the Dell service tag.


Laptops from Dell install a root certificate with the name eDell into the system store that will cause encrypted connections with certificates signed by that eDell certificate to be accepted as valid. The certificate is bundled with a private key that can be extracted.

This issue is very similar to the Superfish, Komodia and Privdog incidents discovered earlier this year.

If your laptop is affected you should remove the certificate with the Windows Certificate Manager. Alternatively you can install Linux and delete Windows.


Superfish 2.0: Dangerous Certificate on Dell Laptops breaks encrypted HTTPS Connections
Certificate and key on Reddit

This test is provided by Hanno Böck.

Diesen test gibt es auch auf Deutsch.