A report 36 σελίδων που δημοσιεύτηκε από την Duo Security αποκαλύπτει την θλιβερή κατάσταση με τα bloatware που χρησιμοποιούν οι OEMs στα laptopκαι όχι μόνο. Με τον όρο bloatware περιγράφουμε τα ενοχλητικά προγράμματα που έρχονται συνήθως σαν updaters οδηγών (drivers). Τις περισσότερες φορές αναφέρονται και ως crapware, και έρχονται ενσωματωμένα με το νέο σας laptop εγκατεστημένα από την ίδια την εταιρεία.
Duo Security's team of researchers conducted checks on the built-in software that comes as a driver updater on laptops from Acer, Asus, Dell, Hewlett-Packard (HP), and Lenovo.
The results of their analysis were very worrying.
Duo Security's research team discovered is that many laptop manufacturers and notebook (OEMs or Original Equipment Manufacturers) use applications with too many security problems that sometimes leave the attacker with full rights to the devices.
"We broke everything and some were worse than others. "Every company had at least one vulnerability that could allow man-in-the-middle (MITM) attacks and arbitrary code execution on the system."
Duo's team reports that the driver update software found on every laptop contains at least one security flaw that allows an attacker to execute code on a user's laptop and take over the device.
Even worse, Duo reports that very few companies know how to properly implement TLS encryption, which explains why we have seen phenomena such as Superfish and eDellRoot from time to time.
In addition, Duo reveals that very few companies know how to validate and verify the integrity of updates downloaded from their driver update programs, leaving users exposed to get false (malicious) drivers.
If you take a look at the table below, you will see that the Lenovo Solution Center Driver Update Tool has positive results in the Duo tests.
The tool can be safe now, but it was not before.
In recent months, security researchers have bombed Lenovo with complaints and bug reports. They ultimately helped the company implement the best security in its implementation, which just at the beginning of the month received an update to correct some of the issues mentioned.
Out-of-Box Exploitation: A Security Analysis of OEM Updaters