Study Shows Lenovo, Other OEM Bloatware Still Poses Huge Security Risk

from the history-repeats-itself-history-repeats-itself dept

Lenovo hasn’t had what you’d call a great track record over the last few years in terms of installing insecure crapware on the company’s products. You’ll recall that early last year, the company was busted for installing Superfish adware that opened all of its customers up to dangerous man-in-the-middle attacks, then tried to claim they didn’t see what all the fuss was about. Not too long after that, the company was busted for using a BiOS trick to reinstall its bloatware on consumer laptops upon reboot — even if the user had installed a fresh copy of the OS.

Now Lenovo and its bloatware are making headlines once again, with the news that the company’s “Accelerator Application” software makes customers vulnerable to hackers. The application is supposed to make the company’s other bloatware, software, and pre-loaded tools run more quickly, but Lenovo was forced to issue a security advisory urging customers to uninstall it because it — you guessed it — opened them up to man-in-the-middle attacks.

The vulnerability was discovered by Duo Labs as part of a larger report on the security of pre-installed OEM software (pdf). The study found consistent security problems specifically in the software used by OEMs to keep all the other bloatware updated. Such software pretty consistently failed to make even basic use of TLS, properly validate update integrity, or verify the authenticity of update manifest contents, leaving consumers at consistent risk of remote attack. It also found that some companies even had multiple software updaters that occasionally served duplicate purposes, most of which were trivial to exploit:

“Updaters are an obvious target for a network attacker, this is a no-brainer. There have been plenty of attacks published against updaters and package management tools in the past, so we can expect OEM?s to learn from this, right? Spoiler: we broke all of them (some worse than others). Every single vendor had at least one vulnerability that could allow for a man-in-the-middle (MITM) attacker to execute arbitrary code as SYSTEM. We?d like to pat ourselves on the back for all the great bugs we found, but the reality is, it?s far too easy.”

And again, to be clear, Lenovo wasn’t alone in being incompetent here. In fact, the firm tried to find any vendor whose bloatware didn’t pose a security risk, and they couldn’t actually do so:

Here’s a novel idea: if OEMs can’t actually learn from past mistakes and secure their bloatware, how about they do us all a favor and stop installing such crapware in the first place?

Filed Under: , , ,
Companies: lenovo

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “Study Shows Lenovo, Other OEM Bloatware Still Poses Huge Security Risk”

Subscribe: RSS Leave a comment
18 Comments
That One Guy (profile) says:

Let's be reasonable here

Here’s a novel idea: if OEMs can’t actually learn from past mistakes and secure their bloatware, how about they do us all a favor and stop installing such crapware in the first place?

There’s good money in shoveling crapware onto unsuspecting customers, money that might decrease if they actually had to make their software secure, so expecting them to stop dumping it on people isn’t likely to happen any time soon.

Instead focus on making to so that people can more easily remove said crapware and secure their own systems, something that both decreases the risk to the owner of the device it was previously infecting and offers up the perfect opportunity to point and laugh when the crapware vendors start whining about how people are uninstalling their rubbish programs.

Anonymous Coward says:

Re: Let's be reasonable here

So… you’ve got OEMs selling systems with bloatware, and you’ve got Apple selling systems without bloatware, for approximately the same price on a featre-per-feature comparison.

So if the other vendors are making money off of their bloatware in order to compete, what gives? They’re not developing the hardware specifications themselves for the most part, and they don’t develop their own OS or software for the most part.

So why aren’t they making more money off of the bloatware?

Whoever says:

The sad fact

The sad fact is that users of PCs have learned to expect to be abused by their vendors and they just accept it.

They expect their PC to be insecure. Until PC users make purchasing decisions that reflect the negative aspects of the insecurities, the vendors will continue to not care.

Ultimately, customers need to put a value on security. I think that most do not value security because they believe that being vulnerable is inevitable.

The problem is compounded by the lack of choice. The only mainstream choice is which vendor will abuse the customer with insecure crapware. There are no mainstream crapware-free choices.

Michael J. Evans (profile) says:

Update Repositories

Windows Update REALLY should have a /list/ of repositories to install packages matching a given form from.

This way a vendor could setup a model specific repository and just point the user to that / have a single URL that they click that asks the user to confirm adding the repo to Windows Update.

Of course they’d never do this, because the point isn’t to keep users up to date, it’s to deliver junk-ware and vendor lockin…

Anonymous Coward says:

I’ve gotten to where any new computer had to have Crap Cleaner run to remove the bloatware before real use. This is probably why Lenvo decided to try and sneak it in by Bios as I have to guess that many other purchasers of new computers were doing the same thing.

Now we have the OS makers like Microsoft trying to get ahead of the game by turning the OS into an advertising platform complete with data mining.

It’s getting to where you can’t find a secure OS much less a computer. At this point, even Linux isn’t the answer as the NSA has been sure to have had it as an aiming point all along.

Anonymous Coward says:

Re: Re:

At this point, even Linux isn’t the answer as the NSA has been sure to have had it as an aiming point all along.

Linux had reasonable protection from the NSA, it is built from source by multiple people in multiple countries. These people control what servers their builds talk to.This makes it very high risk for spy agencies to try to plant software that calls home into Linux, especially as it would have to distribute the source code. Oh, and Snowden has made the task much harder, as more people will be casting a critical eye over the source code, and monitoring outgoing, connections, and some of them would very much like to give uncle Sam a black eye.

Lawrence D’Oliveiro says:

Microsoft = Scylla, Intel = Charybdis

PC makers are getting squeezed into ever-shrinking margins, even as Microsoft and Intel make fat profits on every PC sold. So to boost their tiny profits, the vendors have to resort to “adding value” in any way they can.

Customers put up with this, because it means cheaper PCs. You can get crapware-free PCs, but they cost more. If you want a laptop without Windows, for example, you can go to ZaReason or System76, but expect to pay a higher price for freedom. Most people don’t bother.

Even Microsoft is feeling a bit of a pinch in its profit margins. So it is resorting to the crapware game, too, with Windows 10…

Leave a Reply to Lawrence D’Oliveiro Cancel reply

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...