First published: Fri May 12 2017(Updated: )
Conexant Systems mictray64 task, as used on HP Elite, EliteBook, ProBook, and ZBook systems, leaks sensitive data (keystrokes) to any process. In mictray64.exe (mic tray icon) 1.0.0.46, a LowLevelKeyboardProc Windows hook is used to capture keystrokes. This data is leaked via unintended channels: debug messages accessible to any process that is running in the current user session, and filesystem access to C:\Users\Public\MicTray.log by any process.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Conexant Mictray64 | <=1.0.0.46 | |
Hp Elite X2 1012 G1 | ||
Hp Elitebook 1030 G1 | ||
Hp Elitebook 725 G3 | ||
Hp Elitebook 745 G3 | ||
Hp Elitebook 755 G3 | ||
Hp Elitebook 820 G3 | ||
Hp Elitebook 828 G3 | ||
Hp Elitebook 840 G3 | ||
Hp Elitebook 848 G3 | ||
Hp Elitebook 850 G3 | ||
Hp Elitebook Folio 1040 G3 | ||
Hp Elitebook Folio G1 | ||
Hp Probook 430 G3 | ||
Hp Probook 440 G3 | ||
Hp Probook 446 G3 | ||
Hp Probook 450 G3 | ||
Hp Probook 455 G3 | ||
Hp Probook 470 G3 | ||
Hp Probook 640 G2 | ||
Hp Probook 645 G2 | ||
Hp Probook 650 G2 | ||
Hp Probook 655 G2 | ||
Hp Zbook 15 G3 | ||
Hp Zbook 15u G3 | ||
Hp Zbook 17 G3 | ||
Hp Zbook Studio G3 | ||
Microsoft Windows 10 | ||
Microsoft Windows 7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.