Initiatives for
As the national authority for Cybersecurity the CCB has developed several initiatives for specific publics which are presented here.
Reference:
Advisory #2020-009
Version:
1.0
Affected software:
HP Support Assistant (Version 8.8 and lower)
Type:
Escalation of Privilege, Remote Code Execution (RCE)
CVE/CVSS:
CVSS 3.0 Base Metrics calculated by HP
https://support.hp.com/us-en/document/c06609927
An attacker could exploit the vulnerabilities in multiple ways, including:
The software is pre-installed on all HP machines sold after 2012 that run Windows 7, Windows 8(.1), or Windows 10 operating systems.
The majorities of these flaws were disclosed on October 5, 2019 on which HP acted and released a patch on December 19. However there were still unpatched vulnerabilities after this date and a second report to HP was filed on January 6, 2020.
The patch was eventually released on April 1 which should fix the privilege escalation and arbitrary file deletion vulnerabilities.
Although the users are still at risk for three local privilege escalation vulnerabilities. The researcher who disclosed the flaws says that they can only be exploited after an attacker gains access to your system, lowering the risk.
Possibilities to protect your machine
A proof-of-concept exists for these vulnerabilities which can be found on this blog.
The HP Product Security Response Team released an advisory for these vulnerabilities.
CERT.be recommends applying the patch as soon as possible and enabling automatic updates by default to reduce the risk of exploitation.