cve-2017-8360
Vulnerability from cvelistv5
Published
2017-05-12 06:54
Modified
2024-08-05 16:34
Severity ?
EPSS score ?
Summary
Conexant Systems mictray64 task, as used on HP Elite, EliteBook, ProBook, and ZBook systems, leaks sensitive data (keystrokes) to any process. In mictray64.exe (mic tray icon) 1.0.0.46, a LowLevelKeyboardProc Windows hook is used to capture keystrokes. This data is leaked via unintended channels: debug messages accessible to any process that is running in the current user session, and filesystem access to C:\Users\Public\MicTray.log by any process.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.securitytracker.com/id/1038527 | ||
cve@mitre.org | https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt | Exploit, Mitigation, Technical Description, Third Party Advisory | |
cve@mitre.org | https://www.modzero.ch/modlog/archives/2017/05/11/en_keylogger_in_hewlett-packard_audio_driver/index.html | Exploit, Technical Description, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1038527 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt | Exploit, Mitigation, Technical Description, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.modzero.ch/modlog/archives/2017/05/11/en_keylogger_in_hewlett-packard_audio_driver/index.html | Exploit, Technical Description, Third Party Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T16:34:22.834Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.modzero.ch/modlog/archives/2017/05/11/en_keylogger_in_hewlett-packard_audio_driver/index.html" }, { "name": "1038527", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038527" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-05-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Conexant Systems mictray64 task, as used on HP Elite, EliteBook, ProBook, and ZBook systems, leaks sensitive data (keystrokes) to any process. In mictray64.exe (mic tray icon) 1.0.0.46, a LowLevelKeyboardProc Windows hook is used to capture keystrokes. This data is leaked via unintended channels: debug messages accessible to any process that is running in the current user session, and filesystem access to C:\\Users\\Public\\MicTray.log by any process." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-07T09:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.modzero.ch/modlog/archives/2017/05/11/en_keylogger_in_hewlett-packard_audio_driver/index.html" }, { "name": "1038527", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038527" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-8360", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Conexant Systems mictray64 task, as used on HP Elite, EliteBook, ProBook, and ZBook systems, leaks sensitive data (keystrokes) to any process. In mictray64.exe (mic tray icon) 1.0.0.46, a LowLevelKeyboardProc Windows hook is used to capture keystrokes. This data is leaked via unintended channels: debug messages accessible to any process that is running in the current user session, and filesystem access to C:\\Users\\Public\\MicTray.log by any process." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.modzero.ch/modlog/archives/2017/05/11/en_keylogger_in_hewlett-packard_audio_driver/index.html", "refsource": "MISC", "url": "https://www.modzero.ch/modlog/archives/2017/05/11/en_keylogger_in_hewlett-packard_audio_driver/index.html" }, { "name": "1038527", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038527" }, { "name": "https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt", "refsource": "MISC", "url": "https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-8360", "datePublished": "2017-05-12T06:54:00", "dateReserved": "2017-04-30T00:00:00", "dateUpdated": "2024-08-05T16:34:22.834Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:conexant:mictray64:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.0.0.46\", \"matchCriteriaId\": \"C5B82B26-35F7-4580-83C3-8961F3267232\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:elite_x2_1012_g1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0160130B-8BCB-41A6-A7A5-B03A5083EF11\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:elitebook_1030_g1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F0A39EC7-86EE-458D-8743-7E139E28C18A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:elitebook_725_g3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0DBD4012-6ABA-4EC5-8CE5-4BA947D660FD\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:elitebook_745_g3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"056188C4-E214-4C71-8D84-5B7FF34146D2\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:elitebook_755_g3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6A69E93D-B289-4777-BDD0-B4AAA62441DB\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:elitebook_820_g3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DCD06E7E-045C-4A57-9197-1B12F686514C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:elitebook_828_g3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CDAA1D9A-0191-4113-9A64-F7859E95870D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:elitebook_840_g3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A67B506C-A2CD-4B4B-81C9-AB03B9164EFD\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:elitebook_848_g3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EDFE7CE8-7270-4E92-A659-D2B842604E83\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:elitebook_850_g3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"17B61731-7ADD-4CB5-AE0D-0DA1D6C9C000\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:elitebook_folio_1040_g3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EDB7C8C9-7CF2-4EE3-8BD3-0A9573DDFB61\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:elitebook_folio_g1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A855CCBF-BA02-426E-A645-B8B43F34F26D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:probook_430_g3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1197F876-9F8E-4311-9D55-683BCDFA1BAD\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:probook_440_g3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0AC8772B-7770-40FF-A45E-65D55EF53335\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:probook_446_g3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"772EA71F-0A1F-4D96-A3CE-72F685FEDA0C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:probook_450_g3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"887F7997-005D-4BCB-B607-AC0295B4A3D4\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:probook_455_g3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C4463B3F-3B8E-40E0-94E1-9CB1F2D342C0\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:probook_470_g3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"569E785F-531A-47E8-ABD9-C5B6325E5AB5\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:probook_640_g2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"61C10BE5-F877-4E67-A05A-975D3127303D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:probook_645_g2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"11D94E4D-69E9-4B7A-8AD5-D84E0D88783F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:probook_650_g2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"916C65AC-F54E-4C1D-8BC1-357E6C066186\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:probook_655_g2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CBCCF83E-D3BA-44EC-AF21-80D92BA84DAF\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:zbook_15_g3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D8577621-8CE8-4C94-9E37-A0A1AD76567C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:zbook_15u_g3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"87151407-3BCE-4716-BEF9-3482F858D8FE\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:zbook_17_g3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CE3D4433-E6DC-403B-B0B1-878121AA0EFD\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hp:zbook_studio_g3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"81015892-0FAB-4A12-8B58-2ABBAB369506\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FBC814B4-7DEC-4EFC-ABFF-08FFD9FD16AA\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D56B932B-9593-44E2-B610-E4EB2143EB21\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"Conexant Systems mictray64 task, as used on HP Elite, EliteBook, ProBook, and ZBook systems, leaks sensitive data (keystrokes) to any process. In mictray64.exe (mic tray icon) 1.0.0.46, a LowLevelKeyboardProc Windows hook is used to capture keystrokes. This data is leaked via unintended channels: debug messages accessible to any process that is running in the current user session, and filesystem access to C:\\\\Users\\\\Public\\\\MicTray.log by any process.\"}, {\"lang\": \"es\", \"value\": \"La tarea mictray64 de Conexant Systems, tal como es usada en los sistemas HP Elite, EliteBook, ProBook y ZBook, filtra datos confidenciales (keystrokes) a cualquier proceso. En mictray64.exe (mic tray icon) versi\\u00f3n 1.0.0.46, un hook de Windows en LowLevelKeyboardProc es usado para capturar las pulsaciones de teclas (keystrokes). Estos datos se filtran por medio de canales no deseados: mensajes de depuraci\\u00f3n accesibles a cualquier proceso que se est\\u00e9n ejecutando en la sesi\\u00f3n de usuario actual y acceso al sistema de archivos en C:\\\\Users\\\\Public\\\\MicTray.log mediante cualquier proceso.\"}]", "id": "CVE-2017-8360", "lastModified": "2024-11-21T03:33:51.787", "metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\", \"baseScore\": 5.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:P/I:N/A:N\", \"baseScore\": 2.1, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"LOW\", \"exploitabilityScore\": 3.9, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2017-05-12T07:29:00.187", "references": "[{\"url\": \"http://www.securitytracker.com/id/1038527\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Mitigation\", \"Technical Description\", \"Third Party Advisory\"]}, {\"url\": \"https://www.modzero.ch/modlog/archives/2017/05/11/en_keylogger_in_hewlett-packard_audio_driver/index.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Technical Description\", \"Third Party Advisory\"]}, {\"url\": \"http://www.securitytracker.com/id/1038527\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Mitigation\", \"Technical Description\", \"Third Party Advisory\"]}, {\"url\": \"https://www.modzero.ch/modlog/archives/2017/05/11/en_keylogger_in_hewlett-packard_audio_driver/index.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Technical Description\", \"Third Party Advisory\"]}]", "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-200\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2017-8360\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2017-05-12T07:29:00.187\",\"lastModified\":\"2024-11-21T03:33:51.787\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Conexant Systems mictray64 task, as used on HP Elite, EliteBook, ProBook, and ZBook systems, leaks sensitive data (keystrokes) to any process. In mictray64.exe (mic tray icon) 1.0.0.46, a LowLevelKeyboardProc Windows hook is used to capture keystrokes. This data is leaked via unintended channels: debug messages accessible to any process that is running in the current user session, and filesystem access to C:\\\\Users\\\\Public\\\\MicTray.log by any process.\"},{\"lang\":\"es\",\"value\":\"La tarea mictray64 de Conexant Systems, tal como es usada en los sistemas HP Elite, EliteBook, ProBook y ZBook, filtra datos confidenciales (keystrokes) a cualquier proceso. En mictray64.exe (mic tray icon) versi\u00f3n 1.0.0.46, un hook de Windows en LowLevelKeyboardProc es usado para capturar las pulsaciones de teclas (keystrokes). Estos datos se filtran por medio de canales no deseados: mensajes de depuraci\u00f3n accesibles a cualquier proceso que se est\u00e9n ejecutando en la sesi\u00f3n de usuario actual y acceso al sistema de archivos en C:\\\\Users\\\\Public\\\\MicTray.log mediante cualquier proceso.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":2.1,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:conexant:mictray64:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.0.0.46\",\"matchCriteriaId\":\"C5B82B26-35F7-4580-83C3-8961F3267232\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elite_x2_1012_g1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0160130B-8BCB-41A6-A7A5-B03A5083EF11\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_1030_g1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0A39EC7-86EE-458D-8743-7E139E28C18A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_725_g3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DBD4012-6ABA-4EC5-8CE5-4BA947D660FD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_745_g3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"056188C4-E214-4C71-8D84-5B7FF34146D2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_755_g3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A69E93D-B289-4777-BDD0-B4AAA62441DB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_820_g3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCD06E7E-045C-4A57-9197-1B12F686514C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_828_g3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDAA1D9A-0191-4113-9A64-F7859E95870D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_840_g3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A67B506C-A2CD-4B4B-81C9-AB03B9164EFD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_848_g3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDFE7CE8-7270-4E92-A659-D2B842604E83\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_850_g3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17B61731-7ADD-4CB5-AE0D-0DA1D6C9C000\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_folio_1040_g3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDB7C8C9-7CF2-4EE3-8BD3-0A9573DDFB61\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_folio_g1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A855CCBF-BA02-426E-A645-B8B43F34F26D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_430_g3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1197F876-9F8E-4311-9D55-683BCDFA1BAD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_440_g3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AC8772B-7770-40FF-A45E-65D55EF53335\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_446_g3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"772EA71F-0A1F-4D96-A3CE-72F685FEDA0C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_450_g3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"887F7997-005D-4BCB-B607-AC0295B4A3D4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_455_g3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4463B3F-3B8E-40E0-94E1-9CB1F2D342C0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_470_g3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"569E785F-531A-47E8-ABD9-C5B6325E5AB5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_640_g2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61C10BE5-F877-4E67-A05A-975D3127303D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_645_g2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11D94E4D-69E9-4B7A-8AD5-D84E0D88783F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_650_g2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"916C65AC-F54E-4C1D-8BC1-357E6C066186\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_655_g2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBCCF83E-D3BA-44EC-AF21-80D92BA84DAF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zbook_15_g3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8577621-8CE8-4C94-9E37-A0A1AD76567C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zbook_15u_g3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87151407-3BCE-4716-BEF9-3482F858D8FE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zbook_17_g3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE3D4433-E6DC-403B-B0B1-878121AA0EFD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zbook_studio_g3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81015892-0FAB-4A12-8B58-2ABBAB369506\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBC814B4-7DEC-4EFC-ABFF-08FFD9FD16AA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D56B932B-9593-44E2-B610-E4EB2143EB21\"}]}]}],\"references\":[{\"url\":\"http://www.securitytracker.com/id/1038527\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Mitigation\",\"Technical Description\",\"Third Party Advisory\"]},{\"url\":\"https://www.modzero.ch/modlog/archives/2017/05/11/en_keylogger_in_hewlett-packard_audio_driver/index.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Technical Description\",\"Third Party Advisory\"]},{\"url\":\"http://www.securitytracker.com/id/1038527\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mitigation\",\"Technical Description\",\"Third Party Advisory\"]},{\"url\":\"https://www.modzero.ch/modlog/archives/2017/05/11/en_keylogger_in_hewlett-packard_audio_driver/index.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Technical Description\",\"Third Party Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.