Conexant Systems mictray64 task, as used on HP Elite, EliteBook, ProBook, and ZBook systems, leaks sensitive data (keystrokes) to any process. In mictray64.exe (mic tray icon) 1.0.0.46, a LowLevelKeyboardProc Windows hook is used to capture keystrokes. This data is leaked via unintended channels: debug messages accessible to any process that is running in the current user session, and filesystem access to C:\Users\Public\MicTray.log by any process.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Conexant
Subscribe
|
Mictray64
Subscribe
|
|
Hp
Subscribe
|
Elite X2 1012 G1
Subscribe
Elitebook 1030 G1
Subscribe
Elitebook 725 G3
Subscribe
Elitebook 745 G3
Subscribe
Elitebook 755 G3
Subscribe
Elitebook 820 G3
Subscribe
Elitebook 828 G3
Subscribe
Elitebook 840 G3
Subscribe
Elitebook 848 G3
Subscribe
Elitebook 850 G3
Subscribe
Elitebook Folio 1040 G3
Subscribe
Elitebook Folio G1
Subscribe
Probook 430 G3
Subscribe
Probook 440 G3
Subscribe
Probook 446 G3
Subscribe
Probook 450 G3
Subscribe
Probook 455 G3
Subscribe
Probook 470 G3
Subscribe
Probook 640 G2
Subscribe
Probook 645 G2
Subscribe
Probook 650 G2
Subscribe
Probook 655 G2
Subscribe
Zbook 15 G3
Subscribe
Zbook 15u G3
Subscribe
Zbook 17 G3
Subscribe
Zbook Studio G3
Subscribe
|
|
Microsoft
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2017-17319 | Conexant Systems mictray64 task, as used on HP Elite, EliteBook, ProBook, and ZBook systems, leaks sensitive data (keystrokes) to any process. In mictray64.exe (mic tray icon) 1.0.0.46, a LowLevelKeyboardProc Windows hook is used to capture keystrokes. This data is leaked via unintended channels: debug messages accessible to any process that is running in the current user session, and filesystem access to C:\Users\Public\MicTray.log by any process. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T16:34:22.834Z
Reserved: 2017-04-30T00:00:00
Link: CVE-2017-8360
No data.
Status : Deferred
Published: 2017-05-12T07:29:00.187
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-8360
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD