search menu icon-carat-right cmu-wordmark

CERT Coordination Center


Savitech USB audio drivers install a new root CA certificate

Vulnerability Note VU#446847

Original Release Date: 2017-11-02 | Last Revised: 2017-11-06

Overview

Savitech provides USB audio drivers for a number of specialized audio products. Some versions of the Savitech driver package silently install a root CA certificate into the Windows trusted root certificate store.

Description

Savitech provides USB audio drivers for a number of specialized audio products. Some versions of the Savitech driver package silently install a SaviAudio root CA certificate into the Windows trusted root certificate store. According to Savitech, this certificate is used for driver signing under Windows XP and is no longer necessary, but was not removed from installers for later operating systems. This issue has been assigned CVE-2017-9758.

There is currently no evidence that the Savitech private key is compromised. However, users are encouraged to remove the certificate out of caution. The two known certificates are:

SaviAudio root certificate #1
‎Validity: Thursday, ‎May ‎31, ‎2012 - ‎Tuesday, ‎December ‎30, ‎2036
Serial number: 579885da6f791eb24de819bb2c0eeff0
Thumbprint: cb34ebad73791c1399cb62bda51c91072ac5b050

SaviAudio root certificate #2
Validity: ‎Thursday, ‎December ‎31, ‎2015 - ‎Tuesday, ‎December ‎30, ‎2036
Serial number: ‎972ed9bce72451bb4bd78bfc0d8b343c
Thumbprint: 23e50cd42214d6252d65052c2a1a591173daace5

Savitech has released a new driver package to address the issue. Savitech drivers version 2.8.0.3 or later do not install the root CA certificate. Users still must remove any previously installed certificate manually.

The researchers have released a blog post with further details and impacts of this issue.

Impact

An attacker with access to the Savitech private key material may be able to impersonate web sites and other services, sign and install malicious software, and decrypt network traffic and other data (man in the middle) on affected systems.

Solution

Remove Savitech certificate

Users who have installed these drivers are encouraged to remove the SaviAudio root CA certificate from Savitech. Microsoft provides guidance on deleting and managing certificates in the Windows certificate store; users will need to search for certificate management for their specific Windows environment.

Apply an update

After removal, users are encouraged to install the latest Savitech driver package, version 2.8.0.3 or later.

Vendor Information

446847
Expand all

Savitech

Updated:  September 28, 2017

Statement Date:   September 05, 2017

Status

  Affected

Vendor Statement

We have removed the code of installing SAVITECH’s certificate from software
package after standard software package v2.8.0.3 published on March 31, 2017.

  Customers can get the new software package without installing SAVITECH’s
certificate to install and remove the installed software package.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Dell

Updated:  November 06, 2017

Statement Date:   November 06, 2017

Status

  Not Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Dell EMC

Notified:  August 09, 2017 Updated:  November 03, 2017

Statement Date:   November 03, 2017

Status

  Not Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Accuphase Laboratory, Inc.

Notified:  August 29, 2017 Updated:  August 29, 2017

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

AsusTek Computer Inc.

Notified:  August 29, 2017 Updated:  August 29, 2017

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Audio-Technica

Notified:  August 29, 2017 Updated:  August 29, 2017

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Creek Audio Ltd

Notified:  August 29, 2017 Updated:  August 29, 2017

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

FiiO Electronics Technology Co., Ltd.

Notified:  August 29, 2017 Updated:  August 29, 2017

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

HiFime

Notified:  August 29, 2017 Updated:  August 29, 2017

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Intos Electronic

Notified:  August 29, 2017 Updated:  August 29, 2017

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

JDS Labs

Notified:  August 29, 2017 Updated:  August 29, 2017

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

McIntosh Laboratory, Inc.

Notified:  August 29, 2017 Updated:  August 29, 2017

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

ShenZhen YuLong Audio

Notified:  August 29, 2017 Updated:  August 29, 2017

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Stoner Acoustics

Notified:  August 29, 2017 Updated:  August 29, 2017

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Sybasonic

Notified:  August 29, 2017 Updated:  August 29, 2017

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

TeraDak Audio Electric Company

Notified:  August 29, 2017 Updated:  August 29, 2017

Status

  Unknown

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base 8.8 AV:N/AC:M/Au:N/C:C/I:C/A:N
Temporal 6.9 E:POC/RL:OF/RC:C
Environmental 5.2 CDP:ND/TD:M/CR:ND/IR:ND/AR:ND

References

Credit

Thanks to Kent Backman from RSA for reporting this vulnerability.

This document was written by Garret Wassermann.

Other Information

CVE IDs: CVE-2017-9758
Date Public: 2017-10-03
Date First Published: 2017-11-02
Date Last Updated: 2017-11-06 16:00 UTC
Document Revision: 46

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.