A critical security vulnerability was found in Plantronics Hub software, which has been discontinued by HP. Attackers could escalate privileges using an unquoted search path weakness when combined with OpenScape Fusion for MS Office during startup. The vulnerability takes advantage of a flaw in how Windows handles unquoted paths. Attackers with write access to the C:\ directory can plant malicious files that execute with elevated privileges, allowing them to bypass User Account Control and escalate privileges. As OpenScape Fusion launches Plantronics Hub, the malicious code is executed, leading to privilege escalation. HP has not released a patch but recommends quoting the registry path and restricting write permissions to the C:\ directory as mitigation strategies.
Source: https://cybersecuritynews.com/plantronics-hub-vulnerability/
TPRM report: https://scoringcyber.rankiteo.com/company/hp
"id": "hp909040125",
"linkid": "hp",
"type": "Vulnerability",
"date": "4/2025",
"severity": "60",
"impact": "3",
"explanation": "Attack with significant impact with internal employee data leaks"
{'affected_entities': [{'industry': 'Technology',
'name': 'HP',
'type': 'Company'}],
'attack_vector': 'Unquoted Search Path Weakness',
'description': 'A critical security vulnerability was found in Plantronics '
'Hub software, which has been discontinued by HP. Attackers '
'could escalate privileges using an unquoted search path '
'weakness when combined with OpenScape Fusion for MS Office '
'during startup. The vulnerability takes advantage of a flaw '
'in how Windows handles unquoted paths. Attackers with write '
'access to the C:\\ directory can plant malicious files that '
'execute with elevated privileges, allowing them to bypass '
'User Account Control and escalate privileges. As OpenScape '
'Fusion launches Plantronics Hub, the malicious code is '
'executed, leading to privilege escalation. HP has not '
'released a patch but recommends quoting the registry path and '
'restricting write permissions to the C:\\ directory as '
'mitigation strategies.',
'impact': {'systems_affected': ['Plantronics Hub',
'OpenScape Fusion for MS Office']},
'initial_access_broker': {'entry_point': 'C:\\ directory'},
'motivation': 'Privilege Escalation',
'post_incident_analysis': {'corrective_actions': ['Quote the registry path',
'Restrict write permissions '
'to the C:\\ directory'],
'root_causes': 'Unquoted Search Path Weakness'},
'recommendations': ['Quote the registry path',
'Restrict write permissions to the C:\\ directory'],
'response': {'containment_measures': ['Quoting the registry path',
'Restricting write permissions to the '
'C:\\ directory']},
'title': 'Privilege Escalation Vulnerability in Plantronics Hub Software',
'type': 'Privilege Escalation',
'vulnerability_exploited': 'Unquoted Search Path Weakness in Plantronics Hub'}