A report A 36-page document published by Duo Security reveals the sad state of affairs with the bloatware που χρησιμοποιούν οι OEMs στα laptopκαι όχι μόνο. Με τον όρο bloatware περιγράφουμε τα ενοχλητικά προγράμματα που έρχονται συνήθως σαν updaters οδηγών (drivers). Τις περισσότερες φορές αναφέρονται και ως crapware, και έρχονται ενσωματωμένα με το νέο σας laptop εγκατεστημένα από την ίδια την company.
Duo Security's team of researchers conducted checks on the built-in software that comes as a driver updater on laptops from Acer, Asus, Dell, Hewlett-Packard (HP), and Lenovo.
The results of their analysis were very worrying.
The Duo Security team has discovered that many OEMs or Original Equipment Manufacturers are using applications with too many security problems that sometimes leave the attacker full rights to the devices.
"We broke everything and some were worse than others. "Every company had at least one vulnerability that could allow man-in-the-middle (MITM) attacks and arbitrary code execution on the system."
Η ομάδα της Duo αναφέρει ότι το λογισμικό ενημέρωσης οδηγών που υπάρχει σε κάθε φορητό computer περιλαμβάνει τουλάχιστον ένα ελάττωμα ασφαλείας που επιτρέπει στον εισβολέα να εκτελέσει κώδικα στον φορητό υπολογιστή του χρήστη και να καταλάβει τη συσκευή.
Even worse, Duo reports that very few companies know how to properly implement TLS encryption, which explains why we have seen phenomena such as Superfish and eDellRoot from time to time.
In addition, Duo reveals that very few companies know how to validate and verify the integrity of updates downloaded from their driver update programs, leaving users exposed to get false (malicious) drivers.
If you take a look at the table below, you will see that the Lenovo Solution Center Driver Update Tool has positive results in the Duo tests.
The tool can be safe now, but it was not before.
In recent months, security researchers have bombed Lenovo with complaints and bug reports. They ultimately helped the company implement the best security in its implementation, which just at the beginning of the month received an update to correct some of the issues mentioned.
Out-of-Box Exploitation: A Security Analysis of OEM Updaters