SafeBreach Discovers New Critical Vulnerability In HP Touchpoint Analytics

Newly discovered supply chain attack vector on commonly-used open source hardware diagnostics systems could expose users to a major security risk.

SUNNYVALE, Calif., Oct. 10, 2019 — (PRNewswire) —   SafeBreach, the leader in Breach and Attack Simulation (BAS), today announced that its SafeBreach Labs research team had discovered a critical security vulnerability in Open Hardware Monitor, a free open source software program that monitors temperature sensors, fan speeds, voltages, load and clock speeds of a computer. Tens of millions of computers use Open Hardware Monitor as part of monitoring systems, including HP Touchpoint Analytics. The critical vulnerability was the second of its type found by SafeBreach Labs during the past four months. Previously, SafeBreach Labs discovered a vulnerability in PC-Doctor, a monitoring and diagnostics packaged licensed to Dell and other major OEMs, that is run on hundreds of millions of systems. Both offer attackers the capability to take over machines and read and write to device memory, among the most serious types of security risks.

"These types of vulnerabilities are alarming because they indicate the ease with which malicious hackers could mount supply-chain attacks targeting and breaching highly trusted elements of our software ecosystem," says Itzik Kotler, CTO and Co-Founder at SafeBreach. "And this should be a clear signal to security teams that they need to increase their frequency of testing and analysis of their security envelope in order to match the pace of criminals who are constantly innovating ways to hack into the most vulnerable parts of IT systems."

HP Touchpoint Analytics ships as a default monitoring component of most HP Windows laptops and desktops. HP patched the vulnerability but SafeBreach researchers believe that any machine using the Open Hardware Library was at risk.

A number of potential attacks could result from exploiting this vulnerability giving attackers the ability to load and execute malicious payloads using a signed service, effectively whitelisting those applications. This capability for "Application Whitelisting Bypass" and "Signature Validation Bypassing" might be abused by an attacker for different purposes such as execution and evasion, to name two. Using Open Hardware Monitor's driver, which has the highest level of privileges in the operating system, an attacker can exploit this vulnerability and will be able to read and write to hardware memory.

This is only the latest instance of supply-chain attack vectors, which are among the most dangerous because they compromise trusted components and allow for attackers to go months or years unnoticed enjoying privileged access to devices and systems without being discovered. SafeBreach Labs filed a vulnerability report and has added this instance to its industry-leading Hacker's Playbook, the largest compendium of attack types. The Hacker's Playbook contains over 7,000 breach methods, all generated in programmatically addressable formats that are accessible via API. This research is part of SafeBreach's ongoing efforts to continuously test the most critical assets in the software supply chain for vulnerabilities and weaknesses to further the broader goal of enhanced cybersecurity for all.

For more information on this finding, please visit:   https://safebreach.com/Post/HP-Touchpoint-Analytics-DLL-Search-Order-Hijacking-Potential-Abuses-CVE-2019-6333

About SafeBreach

SafeBreach is a leader in breach and attack simulation. The company's groundbreaking patented platform provides a "hacker's view" of an enterprise's security posture to proactively predict attacks, validate security controls and improve security operations center (SOC) analyst response. SafeBreach automatically executes thousands of breach methods from its extensive and growing Hacker's Playbook™ of research and real-world investigative data. Headquartered in Sunnyvale, California, the company is funded by Sequoia Capital, Deutsche Telekom Capital Partners, DNX Ventures, Hewlett Packard Pathfinder, PayPal and investor Shlomo Kramer. For more information, visit www.safebreach.com or follow us on Twitter @SafeBreach.

SOURCE SafeBreach

Contact:
Company Name: SafeBreach
Web: http://www.safebreach.com


Featured Video
Jobs
Principal Engineer for Autodesk at San Francisco, California
Machine Learning Engineer 3D Geometry/ Multi-Modal for Autodesk at San Francisco, California
Senior Principal Software Engineer for Autodesk at San Francisco, California
Equipment Engineer, Raxium for Google at Fremont, California
Business Technology Analyst for Surface Water Management at Everett, Washington
Mechanical Engineer 2 for Lam Research at Fremont, California
Upcoming Events
Dimensions User Conference 2024 at The Venetian Resort Las Vegas NV - Nov 11 - 13, 2024
Greenbuild 2024 at Pennsylvania Convention Center Philadelphia PA - Nov 12 - 15, 2024
Digital Construction North (DCN) 2024 at Manchester Central. Manchester United Kingdom - Nov 13, 2024
Digital Twins 2024 at the Gaylord National Resort & Convention Center in, MD. National Harbor MD - Dec 9 - 11, 2024



© 2024 Internet Business Systems, Inc.
670 Aberdeen Way, Milpitas, CA 95035
+1 (408) 882-6554 — Contact Us, or visit our other sites:
TechJobsCafe - Technical Jobs and Resumes EDACafe - Electronic Design Automation GISCafe - Geographical Information Services  MCADCafe - Mechanical Design and Engineering ShareCG - Share Computer Graphic (CG) Animation, 3D Art and 3D Models
  Privacy PolicyAdvertise