Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2018-9062

Summary
Assigner-lenovo
Assigner Org ID-da227ddf-6e25-4b41-b023-0f976dcaca4b
Published At-19 Jul, 2018 | 19:00
Updated At-05 Aug, 2024 | 07:10
Rejected At-
Credits

BIOS Modules Unprotected by Intel Boot Guard Vulnerable to Physical Attack

In some Lenovo ThinkPad products, one BIOS region is not properly included in the checks, allowing injection of arbitrary code.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:lenovo
Assigner Org ID:da227ddf-6e25-4b41-b023-0f976dcaca4b
Published At:19 Jul, 2018 | 19:00
Updated At:05 Aug, 2024 | 07:10
Rejected At:
▼CVE Numbering Authority (CNA)
BIOS Modules Unprotected by Intel Boot Guard Vulnerable to Physical Attack

In some Lenovo ThinkPad products, one BIOS region is not properly included in the checks, allowing injection of arbitrary code.

Affected Products
Vendor
Lenovo Group LimitedLenovo Group Ltd.
Product
some Lenovo ThinkPads
Versions
Affected
  • various
Problem Types
TypeCWE IDDescription
textN/AElevation of privilege
Type: text
CWE ID: N/A
Description: Elevation of privilege
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.securityfocus.com/bid/105387
vdb-entry
x_refsource_BID
https://support.lenovo.com/us/en/solutions/LEN-20527
x_refsource_CONFIRM
Hyperlink: http://www.securityfocus.com/bid/105387
Resource:
vdb-entry
x_refsource_BID
Hyperlink: https://support.lenovo.com/us/en/solutions/LEN-20527
Resource:
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.securityfocus.com/bid/105387
vdb-entry
x_refsource_BID
x_transferred
https://support.lenovo.com/us/en/solutions/LEN-20527
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securityfocus.com/bid/105387
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: https://support.lenovo.com/us/en/solutions/LEN-20527
Resource:
x_refsource_CONFIRM
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:psirt@lenovo.com
Published At:19 Jul, 2018 | 19:29
Updated At:15 Oct, 2019 | 18:03

In some Lenovo ThinkPad products, one BIOS region is not properly included in the checks, allowing injection of arbitrary code.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.16.8MEDIUM
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Primary2.07.2HIGH
AV:L/AC:L/Au:N/C:C/I:C/A:C
Type: Primary
Version: 3.1
Base score: 6.8
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 7.2
Base severity: HIGH
Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CPE Matches

Lenovo Group Limited
lenovo
>>e42-80>>-
cpe:2.3:h:lenovo:e42-80:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>e42-80_firmware>>Versions before 2wcn40ww(exclusive)
cpe:2.3:o:lenovo:e42-80_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>e42-80_isk>>-
cpe:2.3:h:lenovo:e42-80_isk:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>e42-80_isk_firmware>>Versions before 0zcn48ww(exclusive)
cpe:2.3:o:lenovo:e42-80_isk_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>e52-80>>-
cpe:2.3:h:lenovo:e52-80:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>e52-80_firmware>>Versions before 2wcn40ww(exclusive)
cpe:2.3:o:lenovo:e52-80_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>e52-80_isk>>-
cpe:2.3:h:lenovo:e52-80_isk:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>e52-80_isk_firmware>>Versions before 0zcn48ww(exclusive)
cpe:2.3:o:lenovo:e52-80_isk_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>miix_720-12ikb>>-
cpe:2.3:h:lenovo:miix_720-12ikb:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>miix_720-12ikb_firmware>>Versions before 3scn68ww(exclusive)
cpe:2.3:o:lenovo:miix_720-12ikb_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>v310-14ikb>>-
cpe:2.3:h:lenovo:v310-14ikb:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>v310-14ikb_firmware>>Versions before 2wcn40ww(exclusive)
cpe:2.3:o:lenovo:v310-14ikb_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>v310-14isk>>-
cpe:2.3:h:lenovo:v310-14isk:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>v310-14isk_firmware>>Versions before 0zcn48ww(exclusive)
cpe:2.3:o:lenovo:v310-14isk_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>v310-15ikb>>-
cpe:2.3:h:lenovo:v310-15ikb:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>v310-15ikb_firmware>>Versions before 2wcn40ww(exclusive)
cpe:2.3:o:lenovo:v310-15ikb_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>v310-15isk_firmware>>Versions before 0zcn48ww(exclusive)
cpe:2.3:o:lenovo:v310-15isk_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>v310-15isk>>-
cpe:2.3:h:lenovo:v310-15isk:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>v510-14ikb_firmware>>Versions before 2wcn40ww(exclusive)
cpe:2.3:o:lenovo:v510-14ikb_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>v510-14ikb>>-
cpe:2.3:h:lenovo:v510-14ikb:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>v510-15ikb_firmware>>Versions before 2wcn40ww(exclusive)
cpe:2.3:o:lenovo:v510-15ikb_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>v510-15ikb>>-
cpe:2.3:h:lenovo:v510-15ikb:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkpad_l380_firmware>>Versions before r0ret28w(exclusive)
cpe:2.3:o:lenovo:thinkpad_l380_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkpad_l380>>-
cpe:2.3:h:lenovo:thinkpad_l380:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkpad_e480_firmware>>Versions before r0pet47w(exclusive)
cpe:2.3:o:lenovo:thinkpad_e480_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkpad_e480>>-
cpe:2.3:h:lenovo:thinkpad_e480:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkpad_e580_firmware>>Versions before r0pet47w(exclusive)
cpe:2.3:o:lenovo:thinkpad_e580_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkpad_e580>>-
cpe:2.3:h:lenovo:thinkpad_e580:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkpad_l480_firmware>>Versions before r0qet47w(exclusive)
cpe:2.3:o:lenovo:thinkpad_l480_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkpad_l480>>-
cpe:2.3:h:lenovo:thinkpad_l480:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkpad_l580_firmware>>Versions before r0qet47w(exclusive)
cpe:2.3:o:lenovo:thinkpad_l580_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkpad_l580>>-
cpe:2.3:h:lenovo:thinkpad_l580:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkpad_p51_firmware>>Versions before n1uet71w(exclusive)
cpe:2.3:o:lenovo:thinkpad_p51_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkpad_p51>>-
cpe:2.3:h:lenovo:thinkpad_p51:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkpad_p51s_firmware>>Versions before n1vet45w(exclusive)
cpe:2.3:o:lenovo:thinkpad_p51s_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkpad_p51s>>-
cpe:2.3:h:lenovo:thinkpad_p51s:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkpad_p52_firmware>>Versions before n2cet28w(exclusive)
cpe:2.3:o:lenovo:thinkpad_p52_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkpad_p52>>-
cpe:2.3:h:lenovo:thinkpad_p52:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkpad_p52s_firmware>>Versions before n27et27w(exclusive)
cpe:2.3:o:lenovo:thinkpad_p52s_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkpad_p52s>>-
cpe:2.3:h:lenovo:thinkpad_p52s:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkpad_p71_firmware>>Versions before n1tet50w(exclusive)
cpe:2.3:o:lenovo:thinkpad_p71_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkpad_p71>>-
cpe:2.3:h:lenovo:thinkpad_p71:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkpad_p72_firmware>>Versions before n2cet28w(exclusive)
cpe:2.3:o:lenovo:thinkpad_p72_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkpad_p72>>-
cpe:2.3:h:lenovo:thinkpad_p72:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkpad_t25_firmware>>Versions before n1qet77w(exclusive)
cpe:2.3:o:lenovo:thinkpad_t25_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkpad_t25>>-
cpe:2.3:h:lenovo:thinkpad_t25:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkpad_t470_firmware>>Versions before n1qet77w(exclusive)
cpe:2.3:o:lenovo:thinkpad_t470_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkpad_t470>>-
cpe:2.3:h:lenovo:thinkpad_t470:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkpad_t470p_firmware>>Versions before r0fet44w(exclusive)
cpe:2.3:o:lenovo:thinkpad_t470p_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkpad_t470p>>-
cpe:2.3:h:lenovo:thinkpad_t470p:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-74Primarynvd@nist.gov
CWE ID: CWE-74
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.securityfocus.com/bid/105387psirt@lenovo.com
Third Party Advisory
VDB Entry
https://support.lenovo.com/us/en/solutions/LEN-20527psirt@lenovo.com
Patch
Vendor Advisory
Hyperlink: http://www.securityfocus.com/bid/105387
Source: psirt@lenovo.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://support.lenovo.com/us/en/solutions/LEN-20527
Source: psirt@lenovo.com
Resource:
Patch
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

73Records found

CVE-2020-8327
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-7.3||HIGH
EPSS-0.10% / 28.63%
||
7 Day CHG~0.00%
Published-14 Apr, 2020 | 21:05
Updated-17 Sep, 2024 | 00:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A privilege escalation vulnerability was reported in LenovoBatteryGaugePackage for Lenovo System Interface Foundation bundled in Lenovo Vantage prior to version 10.2003.10.0 that could allow an authenticated user to execute code with elevated privileges.

Action-Not Available
Vendor-Lenovo Group Limited
Product-vantageVantage
CWE ID-CWE-428
Unquoted Search Path or Element
CWE ID-CWE-269
Improper Privilege Management
CVE-2020-8333
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-6.4||MEDIUM
EPSS-0.04% / 11.13%
||
7 Day CHG~0.00%
Published-24 Sep, 2020 | 21:05
Updated-16 Sep, 2024 | 17:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A potential vulnerability in the SMI callback function used in the EEPROM driver in some Lenovo Desktops and ThinkStation models may allow arbitrary code execution

Action-Not Available
Vendor-Lenovo Group Limited
Product-qitian_b4550h50-30g_firmwarethinkcentre_m4500s_firmwarethinkcentre_m93z_firmwarethinkcentre_m4500q_firmwarethinkcentre_m9350zyangtian_mf_h81_pci_firmwarethinkcentre_m9350z_firmwarethinkstation_c3063_firmwarethinkcentre_m4500kyangtian_mc_h81_firmwareqitian_4500_firmwarethinkcentre_m93zyangtian_wcc_h81_pcithinkcentre_e73sqitian_4500qitian_m4550thinkcentre_m4500k_firmwareyangtian_mf_h81_pcithinkstation_d30_firmwarethinkcentre_e93_firmwarethinkstation_s30_firmwareqitian_m4550_firmwarethinkcentre_m4500t_firmwareyangtian_mc_h81thinkstation_d30yangtian_wf_h81_pci_firmwarem4550thinkcentre_m4500sthinkcentre_m4500qthinkcentre_e73s_firmwarethinkstation_e32_firmwareqitian_b4550_firmwarem4500m4550_firmwarethinkcentre_e73_firmwarem4500_firmwareyangtian_afh81yangtian_wcc_h81_pci_firmwarethinkcentre_e93yangtian_afh81_firmwarethinkcentre_m4500tyangtian_wf_h81_pcithinkstation_c30_firmwarethinkstation_s30yangtian_tc_h81_pci_firmwareyangtian_tc_h81_pcithinkstation_e32thinkstation_p300_firmwarethinkstation_p30063thinkcentre_e73h50-30gBIOS
CVE-2020-8338
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-7.8||HIGH
EPSS-0.05% / 15.93%
||
7 Day CHG~0.00%
Published-14 Oct, 2020 | 21:25
Updated-04 Aug, 2024 | 09:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A DLL search path vulnerability was reported in Lenovo Diagnostics prior to version 4.35.4 that could allow a user with local access to execute code on the system.

Action-Not Available
Vendor-Lenovo Group Limited
Product-diagnosticsDiagnostics
CWE ID-CWE-426
Untrusted Search Path
CVE-2020-8337
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-6.7||MEDIUM
EPSS-0.05% / 13.93%
||
7 Day CHG~0.00%
Published-09 Jun, 2020 | 19:50
Updated-16 Sep, 2024 | 18:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An unquoted search path vulnerability was reported in versions prior to 1.0.83.0 of the Synaptics Smart Audio UWP app associated with the DCHU audio drivers on Lenovo platforms that could allow an administrative user to execute arbitrary code.

Action-Not Available
Vendor-synapticsLenovo Group Limited
Product-thinkpad_s3-s440thinkpad_a275thinkpad_e485thinkpad_x380_yogas540-14iwl_touchthinkpad_a485thinkpad_e490yoga_14thinkpad_t450thinkpad_p53thinkpad_e450cthinkpad_l440thinkpad_e455thinkpad_e575thinkpad_e570thinkpad_l460thinkpad_t450sthinkpad_e540thinkpad_e560v130-15ikbthinkpad_p40thinkpad_a475thinkpad_e555thinkpad_l480thinkpad_e475thinkpad_s2_yoga_4th_genthinkpad_t460thinkpad_e550thinkpad_e565thinkpad_l450c340-14iwls540-14iwlthinkpad_l580thinkpad_11ethinkpad_x270thinkpad_r590thinkpad_a285thinkpad_t460pthinkpad_e580thinkpad_p1thinkpad_e460thinkpad_e545thinkpad_yoga_11ethinkpad_edge_e440thinkpad_s5thinkpad_edge_e445thinkpad_yoga_370thinkpad_l470v310-15igmthinkpad_13thinkpad_s1_yoga_12thinkpad_yoga_11e_3rd_genthinkpad_l380smart_audio_uwpthinkpad_l390_yogathinkpad_x1_extremethinkpad_s2_yoga_3rd_genthinkpad_s1_3rdthinkpad_e480thinkpad_l380_yogathinkpad_yoga_11e_5th_genthinkpad_s3thinkpad_s3_3rd_genthinkpad_r490thinkpad_s3_yoga_145-15ikbthinkpad_e470thinkpad_p73thinkpad_e585thinkpad_yoga_11e_4th_genflex-14iwlthinkpad_e590thinkpad_t470pair-14_2019thinkpad_e450thinkpad_e550cthinkpad_e490sthinkpad_x260thinkpad_l540v330-15igmthinkpad_e465v130-15igmthinkpad_yoga_14_460_s3Synaptics Smart Audio UWP App
CWE ID-CWE-428
Unquoted Search Path or Element
CVE-2020-8354
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-6.4||MEDIUM
EPSS-0.03% / 9.08%
||
7 Day CHG~0.00%
Published-11 Nov, 2020 | 17:35
Updated-04 Aug, 2024 | 09:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A potential vulnerability in the SMI callback function used in the VariableServiceSmm driver in some Lenovo Notebook models may allow arbitrary code execution.

Action-Not Available
Vendor-Lenovo Group Limited
Product-notebook_firmwarenotebookBIOS
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2020-8319
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-7.3||HIGH
EPSS-0.12% / 31.45%
||
7 Day CHG~0.00%
Published-14 Apr, 2020 | 21:05
Updated-16 Sep, 2024 | 17:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A privilege escalation vulnerability was reported in Lenovo System Interface Foundation prior to version 1.1.19.3 that could allow an authenticated user to execute code with elevated privileges.

Action-Not Available
Vendor-Lenovo Group Limited
Product-system_interface_foundationLenovo System Interface Foundation
CVE-2017-3754
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 12.85%
||
7 Day CHG~0.00%
Published-17 Jul, 2017 | 19:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Some Lenovo brand notebook systems do not have write protections properly configured in the system BIOS. This could enable an attacker with physical or administrative access to a system to be able to flash the BIOS with an arbitrary image and potentially run malicious BIOS code.

Action-Not Available
Vendor-Lenovo Group Limited
Product-yoga_710-11ikblenovo_ideapad_320-15astv110-15iaplenovo_ideapad_110-15astk41-80lenovo_ideapad_320-14astv110-14iap710s-13ikb\/xiaoxin_air_13ikbmiix_710-12ikbk21-80lenovo_ideapad_110-14astv110-15iskv110-15ikbk22-80\/lenovo_v720-12710s-13isk\/xiaoxin_air_13biosrescuer_e520-15ikblenovo_xiaoxin_rui7000notebook_320-17astmiix_720-12ikbLenovo Notebook BIOS
CVE-2015-3321
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 10.41%
||
7 Day CHG~0.00%
Published-02 Oct, 2017 | 18:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Services and files in Lenovo Fingerprint Manager before 8.01.42 have incorrect ACLs, which allows local users to invalidate local checks and gain privileges via standard filesystem operations.

Action-Not Available
Vendor-n/aLenovo Group Limited
Product-fingerprint_managern/a
CVE-2015-7333
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 11.10%
||
7 Day CHG~0.00%
Published-27 Mar, 2020 | 14:05
Updated-06 Aug, 2024 | 07:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

MITRE is populating this ID because it was assigned prior to Lenovo becoming a CNA. A local privilege escalation vulnerability was reported (fixed and publicly disclosed in 2015) in Lenovo System Update version 5.07.0008 and prior where the SUService.exe /type INF and INF_BY_COMPATIBLE_ID command types could allow a user to execute arbitrary code with elevated privileges.

Action-Not Available
Vendor-n/aLenovo Group Limited
Product-system_updaten/a
CWE ID-CWE-269
Improper Privilege Management
CVE-2022-3728
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-6.1||MEDIUM
EPSS-0.13% / 32.24%
||
7 Day CHG~0.00%
Published-09 Oct, 2023 | 20:48
Updated-19 Sep, 2024 | 13:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability was reported in ThinkPad T14s Gen 3 and X13 Gen3 that could cause the BIOS tamper detection mechanism to not trigger under specific circumstances which could allow unauthorized access.

Action-Not Available
Vendor-Lenovo Group Limited
Product-thinkpad_t14s_gen_3_firmwarethinkpad_x13_gen_3_firmwarethinkpad_x13_gen_3thinkpad_t14s_gen_3ThinkPad T14s Gen 3 BIOSThinkPad X13 Gen3 BIOS
CWE ID-CWE-1263
Improper Physical Access Control
CVE-2024-7756
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-6.8||MEDIUM
EPSS-0.02% / 4.69%
||
7 Day CHG~0.00%
Published-13 Sep, 2024 | 17:26
Updated-16 Sep, 2024 | 17:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A potential vulnerability was reported in the ThinkPad L390 Yoga and 10w Notebook that could allow a local attacker to escalate privileges by accessing an embedded UEFI shell.

Action-Not Available
Vendor-Lenovo Group Limited
Product-L390 (type 20NR, 20NS) Laptops (ThinkPad) BIOS10w (Type 82ST, 82SU) Laptop (Lenovo) BIOSL390 Yoga (type 20NT, 20NU) Laptops (ThinkPad) BIOSthinkpad_l390_yoga_firmware10w_firmware
CWE ID-CWE-489
Active Debug Code
CVE-2020-8334
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-6.1||MEDIUM
EPSS-0.06% / 19.40%
||
7 Day CHG~0.00%
Published-09 Jun, 2020 | 19:50
Updated-17 Sep, 2024 | 00:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The BIOS tamper detection mechanism was not triggered in Lenovo ThinkPad T495s, X395, T495, A485, A285, A475, A275 which may allow for unauthorized access.

Action-Not Available
Vendor-Lenovo Group Limited
Product-thinkpad_t495s_firmwarethinkpad_a275thinkpad_t495thinkpad_a275_firmwarethinkpad_x395thinkpad_a485thinkpad_a485_firmwarethinkpad_t495_firmwarethinkpad_x395_firmwarethinkpad_a475_firmwarethinkpad_a285thinkpad_a285_firmwarethinkpad_t495sthinkpad_a475BIOS
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
CVE-2019-4558
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-8.1||HIGH
EPSS-0.15% / 35.43%
||
7 Day CHG~0.00%
Published-09 Oct, 2019 | 15:00
Updated-16 Sep, 2024 | 18:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A security vulnerability has been identified in all levels of IBM Spectrum Scale V5.0.0.0 through V5.0.3.2 and IBM Spectrum Scale V4.2.0.0 through V4.2.3.17 that could allow a local attacker to obtain root privilege by injecting parameters into setuid files.

Action-Not Available
Vendor-IBM Corporation
Product-spectrum_scaleSpectrum Scale
CWE ID-CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CVE-2017-6748
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.32% / 54.14%
||
7 Day CHG~0.00%
Published-25 Jul, 2017 | 19:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the CLI parser of the Cisco Web Security Appliance (WSA) could allow an authenticated, local attacker to perform command injection and elevate privileges to root. The attacker must authenticate with valid operator-level or administrator-level credentials. Affected Products: virtual and hardware versions of Cisco Web Security Appliance (WSA). More Information: CSCvd88855. Known Affected Releases: 10.1.0-204. Known Fixed Releases: 10.5.1-270 10.1.1-234.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-web_security_virtual_applianceweb_security_applianceCisco Web Security Appliance
CWE ID-CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CVE-2020-35608
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.24% / 47.15%
||
7 Day CHG~0.00%
Published-22 Dec, 2020 | 19:23
Updated-04 Aug, 2024 | 17:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A code execution vulnerability exists in the normal world’s signed code execution functionality of Microsoft Azure Sphere 20.07. A specially crafted AF_PACKET socket can cause a process to create an executable memory mapping with controllable content. An attacker can execute a shellcode that uses the PACKET_MMAP functionality to trigger this vulnerability.

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-azure_spheren/a
CWE ID-CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CVE-2023-42135
Matching Score-4
Assigner-CERT.PL
ShareView Details
Matching Score-4
Assigner-CERT.PL
CVSS Score-6.8||MEDIUM
EPSS-0.05% / 15.25%
||
7 Day CHG~0.00%
Published-15 Jan, 2024 | 13:28
Updated-17 Jun, 2025 | 21:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

PAX A920Pro/A50 devices with PayDroid_8.1.0_Sagittarius_V11.1.50_20230614 or earlier can allow local code execution via parameter injection by bypassing the input validation when flashing a specific partition. The attacker must have physical USB access to the device in order to exploit this vulnerability.

Action-Not Available
Vendor-paxtechnologyPAX Technology
Product-a50paydroida920_proA50A920 Pro
CWE ID-CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CVE-2017-6015
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.8||HIGH
EPSS-0.05% / 16.68%
||
7 Day CHG~0.00%
Published-11 May, 2018 | 13:00
Updated-16 Sep, 2024 | 21:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Without quotation marks, any whitespace in the file path for Rockwell Automation FactoryTalk Activation version 4.00.02 remains ambiguous, which may allow an attacker to link to or run a malicious executable. This may allow an authorized, but not privileged local user to execute arbitrary code with elevated privileges on the system. CVSS v3 base score: 8.8, CVSS vector string: (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). Rockwell Automation has released a new version of FactoryTalk Activation, Version 4.01, which addresses the identified vulnerability. Rockwell Automation recommends upgrading to the latest version of FactoryTalk Activation, Version 4.01 or later.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-factorytalk_activationFactoryTalk Activation
CWE ID-CWE-428
Unquoted Search Path or Element
CWE ID-CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CVE-2014-7844
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-1.03% / 76.89%
||
7 Day CHG~0.00%
Published-14 Jan, 2020 | 16:13
Updated-06 Aug, 2024 | 13:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitrary commands via a crafted email address.

Action-Not Available
Vendor-bsd_mailx_projectBSDDebian GNU/LinuxRed Hat, Inc.
Product-enterprise_linux_serverdebian_linuxenterprise_linux_server_eusenterprise_linux_server_ausenterprise_linux_workstationbsd_mailxenterprise_linux_server_tusenterprise_linux_desktopmailx
CWE ID-CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CVE-2021-25682
Matching Score-4
Assigner-Canonical Ltd.
ShareView Details
Matching Score-4
Assigner-Canonical Ltd.
CVSS Score-8.8||HIGH
EPSS-0.11% / 30.18%
||
7 Day CHG~0.00%
Published-11 Jun, 2021 | 02:20
Updated-17 Sep, 2024 | 00:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
apport improperly parses /proc/pid/status

It was discovered that the get_pid_info() function in data/apport did not properly parse the /proc/pid/status file from the kernel.

Action-Not Available
Vendor-Canonical Ltd.
Product-apportapport
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CVE-2023-4212
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-6.8||MEDIUM
EPSS-0.09% / 26.07%
||
7 Day CHG~0.00%
Published-22 Aug, 2023 | 17:34
Updated-16 Jan, 2025 | 21:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Trane Thermostats Injection

​A command injection vulnerability exists in Trane XL824, XL850, XL1050, and Pivot thermostats allowing an attacker to execute arbitrary commands as root using a specially crafted filename. The vulnerability requires physical access to the device via a USB stick.

Action-Not Available
Vendor-trane​Trane TechnologiesTrane Technologies
Product-pivotxl1050_firmwarexl1050pivot_firmwarexl850_firmwarexl850xl824_firmwarexl824Pivot ThermostatXL824 ThermostatXL850 ThermostatXL1050 Thermostat
CWE ID-CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CVE-2021-21261
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.3||HIGH
EPSS-0.22% / 45.02%
||
7 Day CHG~0.00%
Published-14 Jan, 2021 | 19:40
Updated-03 Aug, 2024 | 18:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Flatpak sandbox escape via spawn portal

Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. A bug was discovered in the `flatpak-portal` service that can allow sandboxed applications to execute arbitrary code on the host system (a sandbox escape). This sandbox-escape bug is present in versions from 0.11.4 and before fixed versions 1.8.5 and 1.10.0. The Flatpak portal D-Bus service (`flatpak-portal`, also known by its D-Bus service name `org.freedesktop.portal.Flatpak`) allows apps in a Flatpak sandbox to launch their own subprocesses in a new sandbox instance, either with the same security settings as the caller or with more restrictive security settings. For example, this is used in Flatpak-packaged web browsers such as Chromium to launch subprocesses that will process untrusted web content, and give those subprocesses a more restrictive sandbox than the browser itself. In vulnerable versions, the Flatpak portal service passes caller-specified environment variables to non-sandboxed processes on the host system, and in particular to the `flatpak run` command that is used to launch the new sandbox instance. A malicious or compromised Flatpak app could set environment variables that are trusted by the `flatpak run` command, and use them to execute arbitrary code that is not in a sandbox. As a workaround, this vulnerability can be mitigated by preventing the `flatpak-portal` service from starting, but that mitigation will prevent many Flatpak apps from working correctly. This is fixed in versions 1.8.5 and 1.10.0.

Action-Not Available
Vendor-flatpakflatpakDebian GNU/Linux
Product-debian_linuxflatpakflatpak
CWE ID-CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CVE-2023-29389
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.12% / 31.51%
||
7 Day CHG~0.00%
Published-05 Apr, 2023 | 00:00
Updated-12 Feb, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Toyota RAV4 2021 vehicles automatically trust messages from other ECUs on a CAN bus, which allows physically proximate attackers to drive a vehicle by accessing the control CAN bus after pulling the bumper away and reaching the headlight connector, and then sending forged "Key is validated" messages via CAN Injection, as exploited in the wild in (for example) July 2022.

Action-Not Available
Vendor-toyotan/a
Product-rav4_firmwarerav4n/a
CWE ID-CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CVE-2022-31087
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.8||HIGH
EPSS-0.19% / 40.90%
||
7 Day CHG~0.00%
Published-27 Jun, 2022 | 20:50
Updated-23 Apr, 2025 | 18:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Incorrect Default Permissions in ldap-account-manager

LDAP Account Manager (LAM) is a webfrontend for managing entries (e.g. users, groups, DHCP settings) stored in an LDAP directory. In versions prior to 8.0 the tmp directory, which is accessible by /lam/tmp/, allows interpretation of .php (and .php5/.php4/.phpt/etc) files. An attacker capable of writing files under www-data privileges can write a web-shell into this directory, and gain a Code Execution on the host. This issue has been fixed in version 8.0. Users unable to upgrade should disallow executing PHP scripts in (/var/lib/ldap-account-manager/)tmp directory.

Action-Not Available
Vendor-ldap-account-managerLDAPAccountManagerDebian GNU/Linux
Product-debian_linuxldap_account_managerlam
CWE ID-CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CWE ID-CWE-863
Incorrect Authorization
  • Previous
  • 1
  • 2
  • Next
Details not found