Thursday, February 27, 2025
HomeCVE/vulnerabilityHP Support Assistant High Severity Flaw Let Attackers Escalate Privileges

HP Support Assistant High Severity Flaw Let Attackers Escalate Privileges

Published on

SIEM as a Service

Follow Us on Google News

HP patches a high-severity security flaw in the HP Support Assistant, which helps keep HP computer in working order by finding updates and providing troubleshooting tools. 

It’s a software tool that comes pre-installed on all HP laptops and desktop computers, including the Omen sub-brand. It carries out hardware diagnostic tests, dive deeper into technical specifications, check performance related metrics, and driver updates on HP devices.

The flaw is tracked as (CVE-2022-38395), with a high severity score of 8.2, which leads to privilege escalation vulnerability. The flaw was revealed by researchers at Secure D.

“It is possible for an attacker to exploit the DLL hijacking vulnerability and elevates privileges when Fusion launches the HP Performance Tune-up”, reads the advisory from HP

Thus, a DLL hijacking vulnerability triggered when the user launches HP Performance Tune-up within HP Support Assistant. This takes place when a threat actor places a DLL containing malicious code on the same folder as the abused executable, exploiting Windows’ logic to prioritize those libraries against DLLs in the System32 directory.

The subsystem that can trigger the DLL hijacking flaw

The subsystem that can trigger the DLL hijacking attack

In this case, the code that executes by loading the library assumes the privileges of the abused executable which is HP Support Assistant running with ‘SYSTEM’ privileges.

Affected Products

  • HP Support Assistant versions earlier than 9.11.
  • Fusion versions earlier than 1.38.2601.0.

Recommendations

HP advises the customers update to the latest version of HP Support Assistant that includes fixes for issues by turning on automatic updates in the HP Support Assistant settings. 

If the system has HP Support Assistant version 8x, it is recommended to upgrade to HP Support Assistant version 9 by going to the “About” section and “check for updates”. If the system has HP Support Assistant version 9, keep the Microsoft Store updates turned on so that the application is always kept up to date.

Download Free SWG – Secure Web Filtering – E-book

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

GitLab Vulnerabilities Allow Attackers to Bypass Security and Run Arbitrary Scripts

GitLab has urgently released security updates to address multiple high-severity vulnerabilities in its platform...

LibreOffice Flaws Allow Attackers to Run Malicious Files on Windows

A high-severity security vulnerability (CVE-2025-0514) in LibreOffice, the widely used open-source office suite, has...

Cisco Nexus Switch Vulnerability Allows Attackers to Cause DoS

Cisco Systems has disclosed a high-severity vulnerability (CVE-2025-20111) in its Nexus 3000 and 9000...

Silver Fox APT Hackers Target Healthcare Services to Steal Sensitive Data

A sophisticated cyber campaign orchestrated by the Chinese Advanced Persistent Threat (APT) group, Silver...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

GitLab Vulnerabilities Allow Attackers to Bypass Security and Run Arbitrary Scripts

GitLab has urgently released security updates to address multiple high-severity vulnerabilities in its platform...

LibreOffice Flaws Allow Attackers to Run Malicious Files on Windows

A high-severity security vulnerability (CVE-2025-0514) in LibreOffice, the widely used open-source office suite, has...

Cisco Nexus Switch Vulnerability Allows Attackers to Cause DoS

Cisco Systems has disclosed a high-severity vulnerability (CVE-2025-20111) in its Nexus 3000 and 9000...