CVE-2019-18619
📋 TL;DR
This vulnerability allows a local attacker to execute arbitrary code within the Synaptics fingerprint driver's secure enclave (SGX) by passing invalid pointers to certain APIs. This compromises the confidentiality of sensitive biometric data stored in the enclave. Affected systems include laptops and devices using Synaptics WBF fingerprint drivers with SGX enclaves.
💻 Affected Systems
- Synaptics WBF fingerprint drivers with SGX enclave
- HP laptops with Synaptics fingerprint sensors
- Lenovo laptops with Synaptics fingerprint sensors
📦 What is this software?
Envy 15 Dr0xxx X360 \(validity Fps\) Firmware by Hp
View all CVEs affecting Envy 15 Dr0xxx X360 \(validity Fps\) Firmware →
Envy 15 Dr1xxx X360 \(validity Fps\) Firmware by Hp
View all CVEs affecting Envy 15 Dr1xxx X360 \(validity Fps\) Firmware →
Envy 15m Dr0xxx X360 \(validity Fps\) Firmware by Hp
View all CVEs affecting Envy 15m Dr0xxx X360 \(validity Fps\) Firmware →
Envy 15m Dr1xxx X360 \(validity Fps\) Firmware by Hp
View all CVEs affecting Envy 15m Dr1xxx X360 \(validity Fps\) Firmware →
Envy X360 15t Dr000 \(validity Fps\) Firmware by Hp
View all CVEs affecting Envy X360 15t Dr000 \(validity Fps\) Firmware →
Envy X360 15t Dr100 \(validity Fps\) Firmware by Hp
View all CVEs affecting Envy X360 15t Dr100 \(validity Fps\) Firmware →
Thinkpad T470s \(20hx\) Firmware by Lenovo
Thinkpad T470s \(20jx\) Firmware by Lenovo
Thinkpad X1 Carbon \(20hx\) Firmware by Lenovo
View all CVEs affecting Thinkpad X1 Carbon \(20hx\) Firmware →
Thinkpad X1 Carbon \(20kx\) Firmware by Lenovo
View all CVEs affecting Thinkpad X1 Carbon \(20kx\) Firmware →
Thinkpad X1 Extreme 2nd Firmware by Lenovo
Thinkpad X1 Tablet \(20jx\) Firmware by Lenovo
View all CVEs affecting Thinkpad X1 Tablet \(20jx\) Firmware →
Thinkpad X1 Yoga \(20jx\) Firmware by Lenovo
View all CVEs affecting Thinkpad X1 Yoga \(20jx\) Firmware →
Thinkpad X1 Yoga 3rd Gen Firmware by Lenovo
Thinkpad X1 Yoga 4th Gen Firmware by Lenovo
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the secure enclave, allowing theft of encrypted biometric data, installation of persistent malware, and bypassing of fingerprint authentication security.
Likely Case
Local privilege escalation leading to unauthorized access to protected biometric data and potential system compromise.
If Mitigated
Limited impact if proper access controls restrict local user privileges and enclave isolation mechanisms are functioning correctly.
🎯 Exploit Status
Exploitation requires local access and knowledge of driver APIs. No public exploit code has been released, but the vulnerability is well-documented in security research papers.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Versions released on or after 2019-11-15
Vendor Advisory: https://www.synaptics.com/sites/default/files/fingerprint-driver-SGX-security-brief-2020-07-14.pdf
Restart Required: Yes
Instructions:
1. Download updated Synaptics WBF driver from device manufacturer (HP/Lenovo) or Synaptics website. 2. Install the updated driver. 3. Restart the system to complete installation.
🔧 Temporary Workarounds
Disable fingerprint authentication
windowsTemporarily disable fingerprint login to prevent exploitation of the biometric data enclave.
Windows Settings > Accounts > Sign-in options > Disable Windows Hello Fingerprint
Restrict local user privileges
allLimit standard user accounts to prevent local code execution attacks.
🧯 If You Can't Patch
- Disable or remove Synaptics fingerprint driver completely
- Implement strict access controls to prevent unauthorized local access to affected systems
🔍 How to Verify
Check if Vulnerable:
Check Synaptics driver version in Device Manager > Biometric devices > Synaptics WBDI > Driver tab. Versions before 2019-11-15 are vulnerable.
Check Version:
wmic path Win32_PnPSignedDriver where "DeviceName like '%Synaptics%'" get DeviceName, DriverVersion
Verify Fix Applied:
Verify driver version is 2019-11-15 or later in Device Manager. Test fingerprint authentication functionality.
📡 Detection & Monitoring
Log Indicators:
- Unusual driver loading events
- Failed fingerprint authentication attempts from unexpected users
- Windows Event Logs showing driver crashes (Event ID 1000)
Network Indicators:
- No network indicators - this is a local vulnerability
SIEM Query:
EventID=1000 AND SourceName="Application Error" AND Message LIKE "%Synaptics%"
🔗 References
- https://support.hp.com/hk-en/document/c06696568
- https://support.lenovo.com/us/en/product_security/LEN-31372
- https://www.synaptics.com/company/blog/
- https://www.synaptics.com/sites/default/files/fingerprint-driver-SGX-security-brief-2020-07-14.pdf
- https://www.syssec.wiwi.uni-due.de/en/research/research-projects/analysis-of-tee-software/
- https://support.hp.com/hk-en/document/c06696568
- https://support.lenovo.com/us/en/product_security/LEN-31372
- https://www.synaptics.com/company/blog/
- https://www.synaptics.com/sites/default/files/fingerprint-driver-SGX-security-brief-2020-07-14.pdf
- https://www.syssec.wiwi.uni-due.de/en/research/research-projects/analysis-of-tee-software/