New Lenovo Security Vulnerability

The Register, as well as many other news sources, is reporting a new security vulnerability in Lenovo products.

Security researchers at IOActive uncovered a mechanism that would have allowed hackers to create a fake certificate authority in order to sign executables. The trick could be used to replace legitimate Lenovo programs with malware by hackers on the same untrusted wireless network, of the type commonly found in coffee-shops, pubs and transport hubs, as IOActive explains:

Local and potentially remote attackers can bypass signature validation checks and replace trusted Lenovo applications with malicious applications. These applications will then be run as a privileged user. The System Update downloads executables from the Internet and runs them.

Remote attackers who can perform a man in the middle attack (the classic coffee shop attack) can exploit this to swap Lenovo’s executables with a malicious executable.

More >

You could find a more-to-the-point article on this, but The Register’s writing makes this story much more fun.

Author: Gregg Eldred

This is a weblog with some basis in IBM/Lotus Notes & Domino software, when I feel like it or think of something that might be interesting. Other than that, we'll see where this goes. The views expressed in this blog are mine alone, and do not reflect the views of NextStep Technologies, LLC. If you think otherwise, you are mistaken. © 2003-2020 NextStep Technologies, LLC. All rights reserved. The rights to all logos, images, etc., are owned by their respective owners.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s