SafeBreach catches vulnerability in controversial HP Touchpoint Analytics software program

By  |  0 Comments
Related Products

After being notified on July four, HP waited 4 months earlier than releasing a safety advisory.

Stephen Hawking and HPE will use information to learn the way the universe started
Hawking’s COSMOS group will use the Superdome Flex supercomputer to investigate gravitational wave information, says TechRepublic’s Alison DeNisco Rayome.

Since HP Touchpoint Analytics was launched to customers in 2017, it has been a hotrod for controversy. In 2017 HP stated the characteristic “anonymously collects diagnostic details about efficiency. No information is shared with HP except entry is expressly granted. Clients can opt-out or uninstall the service at any time.”

However customers have continued to fill boards with complaints about it, starting from questions on safety to claims that it slowed down their computer systems. 

Now the characteristic is embroiled in one other minor controversy after safety researchers at SafeBreach stated they uncovered a brand new vulnerability. HP Touchpoint Analytics comes preinstalled on many HP gadgets that run Home windows. Each model beneath four.1.four.2827 is affected by what SafeBreach discovered.

In a weblog put up, SafeBreach Labs safety researcher Peleg Hadar stated that as a result of the service is executed as “NT AUTHORITYSYSTEM,” it’s afforded extraordinarily highly effective permissions that give it broad entry.

“The CVE-2019-6333 vulnerability offers attackers the power to load and execute malicious payloads utilizing a signed service. This capacity could be abused by an attacker for various functions corresponding to execution and evasion, for instance: Software Whitelisting Bypass Signature Validation Bypassing,” Hadar wrote.

“The elements which permit HP Touchpoint Analytics to entry delicate, low-level (corresponding to bodily reminiscence, MSRs and SMBios) are supplied by an open supply monitoring library which is known as ‘Open Monitor’.”

SEE: Particular report: A profitable technique for cybersecurity (free PDF) (TechRepublic Premium)

The SafeBreach report defined that the safety flaw was discovered inside HP Touchpoint Analytics’ open-source software program program and demonstrated the way it might doubtlessly be utilized by cybercriminals to get privilege escalation and persistence by loading an arbitrary unsigned DLL right into a service that runs as SYSTEM.

Lindsey O’Donnell at Threatpost defined that “the affected software program, Open Monitor, screens temperature sensors, fan speeds, voltages, load and clock speeds of a pc. It’s utilized by tens of thousands and thousands of computer systems and is a key third-party element of HP Touchpoint Analytics.”

On the finish of the report on the issue, Hadar notes that SafeBreach notified HP of the vulnerability on July four, 2019 and went by way of a prolonged backwards and forwards that lasted 4 months. HP solely launched a safety bulletin on the issue earlier this month on October four.

“HP is broadly distributing this Safety Bulletin with a purpose to deliver to the eye of customers of the affected HP merchandise the necessary safety info contained on this Bulletin.HP recommends that each one customers decide the applicability of this info to their particular person conditions and take acceptable motion,” HP stated within the discover.

“HP doesn’t warrant that this info is essentially correct or full for all person conditions and, consequently, HP won’t be liable for any damages ensuing from person’s use or disregard of the knowledge supplied on this Bulletin.To the extent permitted by legislation, HP disclaims all warranties, both specific or implied, together with the warranties of merchantability and health for a selected function, title and non-infringement.”

The corporate has lengthy needed to defend HP Touchpoint Analytics towards critics who say it offers HP pointless entry to customers’ techniques. When it first grew to become broadly seen in 2017, dozens of customers complained that they’d not consented to including the system.

“I discovered HP Touchpoint Supervisor unexpectedly deployed on my PC earlier this week (16/11) – clearly with out my consent. I perceive that it hoovers all kinds of telemetry information – and I’m not prepared to share an excessive amount of of it actually, undoubtedly not with out my data,” one person wrote in November 2017.

On the time, HP was pressured to launch an announcement saying the service was provided since 2014 as a part of HP Help Assistant.” They reiterated that HP didn’t acquire any information with out being “expressly granted,” one thing customers nonetheless dispute. 

“HP Touchpoint Analytics was lately up to date and there have been no modifications to privateness settings as a part of this replace. We take buyer privateness very severely and act in accordance with a strict coverage, accessible right here,” the corporate assertion stated in 2017.

Additionally see

Easy methods to change into a cybersecurity professional: A cheat sheet (TechRepublic)
Mastermind con man behind Catch Me If You Can talks cybersecurity (TechRepublic obtain)
Home windows 10 safety: A information for enterprise leaders (TechRepublic Premium)
On-line safety 101: Suggestions for shielding your privateness from hackers and spies (ZDNet)
The very best password managers of 2019 (CNET)
Cybersecurity and cyberwar: Extra must-read protection (TechRepublic on Flipboard)

Businesswoman on blurred background using digital padlock security interface to protect datas

Picture: Getty Photographs/iStockphoto


You must be logged in to post a comment Login