HP Support Assistant High Severity Flaw Let Attackers Escalate Privileges

HP patches a high-severity security flaw in the HP Support Assistant, which helps keep HP computer in working order by finding updates and providing troubleshooting tools. 

It’s a software tool that comes pre-installed on all HP laptops and desktop computers, including the Omen sub-brand. It carries out hardware diagnostic tests, dive deeper into technical specifications, check performance related metrics, and driver updates on HP devices.

The flaw is tracked as (CVE-2022-38395), with a high severity score of 8.2, which leads to privilege escalation vulnerability. The flaw was revealed by researchers at Secure D.

“It is possible for an attacker to exploit the DLL hijacking vulnerability and elevates privileges when Fusion launches the HP Performance Tune-up”, reads the advisory from HP

Thus, a DLL hijacking vulnerability triggered when the user launches HP Performance Tune-up within HP Support Assistant. This takes place when a threat actor places a DLL containing malicious code on the same folder as the abused executable, exploiting Windows’ logic to prioritize those libraries against DLLs in the System32 directory.

The subsystem that can trigger the DLL hijacking attack

In this case, the code that executes by loading the library assumes the privileges of the abused executable which is HP Support Assistant running with ‘SYSTEM’ privileges.

Affected Products

  • HP Support Assistant versions earlier than 9.11.
  • Fusion versions earlier than 1.38.2601.0.

Recommendations

HP advises the customers update to the latest version of HP Support Assistant that includes fixes for issues by turning on automatic updates in the HP Support Assistant settings. 

If the system has HP Support Assistant version 8x, it is recommended to upgrade to HP Support Assistant version 9 by going to the “About” section and “check for updates”. If the system has HP Support Assistant version 9, keep the Microsoft Store updates turned on so that the application is always kept up to date.

Download Free SWG – Secure Web Filtering – E-book

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Silver Fox APT Hackers Target Healthcare Services to Steal Sensitive Data

A sophisticated cyber campaign orchestrated by the Chinese Advanced Persistent Threat (APT) group, Silver Fox,…

7 hours ago

Ghostwriter Malware Targets Government Organizations with Weaponized XLS File

A new wave of cyberattacks attributed to the Ghostwriter Advanced Persistent Threat (APT) group has…

7 hours ago

LCRYX Ransomware Attacks Windows Machines by Blocking Registry Editor and Task Manager

The LCRYX ransomware, a malicious VBScript-based threat, has re-emerged in February 2025 after its initial…

7 hours ago

Threat Actors Using Ephemeral Port 60102 for Covert Malware Communications

Recent cybersecurity investigations have uncovered a sophisticated technique employed by threat actors to evade detection…

7 hours ago

App with Over 100,000 Downloads from Google Play Steals User Data and Blackmails

A financial management app named Finance Simplified has been revealed as a malicious tool for…

7 hours ago

Poseidon Mac Malware Hiding Within PKG Files to Evade Detections

A recent discovery by cybersecurity researchers has revealed that the Poseidon malware, a macOS-targeting trojan,…

7 hours ago