This article is a mirror article of machine translation, please click here to jump to the original article.

View: 13958|Reply: 2

[Security Vulnerability] Lenovo, Dell and Toshiba computers exposed serious OEM vulnerabilities

[Copy link]
Posted on 12/11/2015 2:26:50 PM | | |
Recently, Lenovo devices can be easily hijacked again, while Dell and Toshiba PCs have also been affected by serious vulnerabilities. Security Researcherslipstream/RoL published the vulnerability online and demonstrated how to hack into the machines on the market.
Three OEMs, three pre-installed apps, three vulnerabilities
CERT in the United States has issued an alert for Lenovo's vulnerability, and the Chinese headquarters is also stepping up its efforts to uninstall the solution center.
The U.S. Internet Emergency Response Center (CERT) states:

If your Lenovo Solution Center is always open, then hackers can exploit the vulnerability remotely via CSRF.

Vulnerability details

association

1. Lenovo Solution Center creates a file called The LSCTaskService process can run with administrator privileges and eject a web server on port 55555。 It can also execute code in the local user directory via GET and POST HTTP requests.

2. Lenovo Solution Center generally executes programs anywhere on the hard disk with full control permissions. Put malware in it, and Lenovo Solution Center will execute it.

3. A typical cross-site request forgery (CSRF) vulnerability exists in the LSCTaskServic process that allows any visited web page to pass commands to the local web server and execute them.

Dale

Similarly, Dell's bundled tool, Dell System Detection, can directly gain administrator privileges to install malware to damage your computer.

Toshiba

Toshiba's service station tool allows ordinary users or unauthorized software to directly have the authority of a system-level user to read the operating system's registry.


Original:http://www.freebuf.com/news/88650.html





Previous:Seeing you working so hard, I want to pick up the previous books and study
Next:Which protocols are TCP-based and which are UDP-based?
Posted on 12/11/2015 5:09:36 PM |
Posted on 12/11/2015 11:48:32 PM |
It is estimated that many hackers are scanning port 55555
Disclaimer:
All software, programming materials or articles published by Code Farmer Network are only for learning and research purposes; The above content shall not be used for commercial or illegal purposes, otherwise, users shall bear all consequences. The information on this site comes from the Internet, and copyright disputes have nothing to do with this site. You must completely delete the above content from your computer within 24 hours of downloading. If you like the program, please support genuine software, purchase registration, and get better genuine services. If there is any infringement, please contact us by email.

Mail To:help@itsvse.com