LandzDown Forum

Software & More => Web News => Topic started by: Corrine on May 31, 2016, 07:51:56 PM

Title: Out-of-Box Exploitation: A Security Analysis of OEM Updaters
Post by: Corrine on May 31, 2016, 07:51:56 PM
Duo Security conducted a study of the out-of-box experience (OOBE) of OEM (Original Equipment Manufacturers) PCs.  One of the major things they found was the presence of third-party update tools. Every OEM they looked at included one (or more) with their default configuration.  Duo Security identified and reported twelve unique vulnerabilities across all of the vendors and identified a number of concerning trends. 

Blog Post: Out-of-Box Exploitation: A Security Analysis of OEM Updaters (https://duo.com/blog/out-of-box-exploitation-a-security-analysis-of-oem-updaters)

Report (PDF):  Out-of-Box Exploitation: A Security Analysis of OEM Updaters (https://duo.com/assets/pdf/out-of-box-exploitation_oem-updaters.pdf)
Title: Re: Out-of-Box Exploitation: A Security Analysis of OEM Updaters
Post by: Corrine on June 02, 2016, 07:45:34 PM
Related:  Lenovo begs users to uninstall Accelerator app in the name of security (http://www.zdnet.com/article/lenovo-begs-users-to-uninstall-accelerator-app-in-the-name-of-security/)

QuoteLenovo has urged users to uninstall bloatware bundled on Windows 10 devices by the company after critical security holes were discovered.

This week, the Chinese PC maker said in a security advisory a vulnerability within the company's Lenovo Accelerator Application software is a "high severity" problem which could give attackers the avenue to launch man-in-the-middle (MITM) attacks against users.

MITM attacks occur when a vulnerable machine has been infected with malware which contains surveillance capabilities or a vulnerable web browser is communicating with an insecure server.

List of impacted devices:  https://support.lenovo.com/gb/en/product_security/len_6718