5.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:P/A:N
7.4 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
0.003 Low
EPSS
Percentile
67.9%
Savitech provides USB audio drivers for a number of specialized audio products. Some versions of the Savitech driver package silently install a root CA certificate into the Windows trusted root certificate store.
Savitech provides USB audio drivers for a number of specialized audio products. Some versions of the Savitech driver package silently install a SaviAudio root CA certificate into the Windows trusted root certificate store. According to Savitech, this certificate is used for driver signing under Windows XP and is no longer necessary, but was not removed from installers for later operating systems. This issue has been assigned CVE-2017-9758.
There is currently no evidence that the Savitech private key is compromised. However, users are encouraged to remove the certificate out of caution. The two known certificates are:
SaviAudio root certificate #1
Validity: Thursday, May 31, 2012 - Tuesday, December 30, 2036
Serial number: 579885da6f791eb24de819bb2c0eeff0
Thumbprint: cb34ebad73791c1399cb62bda51c91072ac5b050
SaviAudio root certificate #2
Validity: Thursday, December 31, 2015 - Tuesday, December 30, 2036
Serial number: 972ed9bce72451bb4bd78bfc0d8b343c
Thumbprint: 23e50cd42214d6252d65052c2a1a591173daace5
Savitech has released a new driver package to address the issue. Savitech drivers version 2.8.0.3 or later do not install the root CA certificate. Users still must remove any previously installed certificate manually.
The researchers have released a blog post with further details and impacts of this issue.
An attacker with access to the Savitech private key material may be able to impersonate web sites and other services, sign and install malicious software, and decrypt network traffic and other data (man in the middle) on affected systems.
Remove Savitech certificate
Users who have installed these drivers are encouraged to remove the SaviAudio root CA certificate from Savitech. Microsoft provides guidance on deleting and managing certificates in the Windows certificate store; users will need to search for certificate management for their specific Windows environment.
Apply an update
After removal, users are encouraged to install the latest Savitech driver package, version 2.8.0.3 or later.
446847
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: September 28, 2017
Statement Date: September 05, 2017
Affected
`We have removed the code of installing SAVITECH’s certificate from software
package after standard software package v2.8.0.3 published on March 31, 2017.
Customers can get the new software package without installing SAVITECH’s
certificate to install and remove the installed software package.`
We are not aware of further vendor information regarding this vulnerability.
Updated: November 06, 2017
Statement Date: November 06, 2017
Not Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: August 09, 2017 Updated: November 03, 2017
Statement Date: November 03, 2017
Not Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: August 29, 2017 Updated: August 29, 2017
Unknown
We have not received a statement from the vendor.
Notified: August 29, 2017 Updated: August 29, 2017
Unknown
We have not received a statement from the vendor.
Notified: August 29, 2017 Updated: August 29, 2017
Unknown
We have not received a statement from the vendor.
Notified: August 29, 2017 Updated: August 29, 2017
Unknown
We have not received a statement from the vendor.
Notified: August 29, 2017 Updated: August 29, 2017
Unknown
We have not received a statement from the vendor.
Notified: August 29, 2017 Updated: August 29, 2017
Unknown
We have not received a statement from the vendor.
Notified: August 29, 2017 Updated: August 29, 2017
Unknown
We have not received a statement from the vendor.
Notified: August 29, 2017 Updated: August 29, 2017
Unknown
We have not received a statement from the vendor.
Notified: August 29, 2017 Updated: August 29, 2017
Unknown
We have not received a statement from the vendor.
Notified: August 29, 2017 Updated: August 29, 2017
Unknown
We have not received a statement from the vendor.
Notified: August 29, 2017 Updated: August 29, 2017
Unknown
We have not received a statement from the vendor.
Notified: August 29, 2017 Updated: August 29, 2017
Unknown
We have not received a statement from the vendor.
Notified: August 29, 2017 Updated: August 29, 2017
Unknown
We have not received a statement from the vendor.
View all 16 vendors __View less vendors __
Group | Score | Vector |
---|---|---|
Base | 8.8 | AV:N/AC:M/Au:N/C:C/I:C/A:N |
Temporal | 6.9 | E:POC/RL:OF/RC:C |
Environmental | 5.2 | CDP:ND/TD:M/CR:ND/IR:ND/AR:ND |
Thanks to Kent Backman from RSA for reporting this vulnerability.
This document was written by Garret Wassermann.
CVE IDs: | CVE-2017-9758 |
---|---|
Date Public: | 2017-10-03 Date First Published: |
huagati.blogspot.com/2015/07/do-you-know-which-cas-can-issue-ssltls.html
windows.microsoft.com/en-us/windows-vista/view-or-manage-your-certificates
community.rsa.com/community/products/netwitness/blog/2017/10/27/inaudible-subversion-did-your-hi-fi-just-subvert-your-pc
insights.sei.cmu.edu/cert/2015/03/the-risks-of-ssl-inspection.html
technet.microsoft.com/en-us/library/cc772354.aspx
technet.microsoft.com/en-us/library/dn265983.aspx
technet.microsoft.com/en-us/library/security/3119884.aspx
5.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:P/A:N
7.4 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
0.003 Low
EPSS
Percentile
67.9%