Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2020-8327

Summary
Assigner-lenovo
Assigner Org ID-da227ddf-6e25-4b41-b023-0f976dcaca4b
Published At-14 Apr, 2020 | 21:05
Updated At-17 Sep, 2024 | 00:11
Rejected At-
Credits

A privilege escalation vulnerability was reported in LenovoBatteryGaugePackage for Lenovo System Interface Foundation bundled in Lenovo Vantage prior to version 10.2003.10.0 that could allow an authenticated user to execute code with elevated privileges.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:lenovo
Assigner Org ID:da227ddf-6e25-4b41-b023-0f976dcaca4b
Published At:14 Apr, 2020 | 21:05
Updated At:17 Sep, 2024 | 00:11
Rejected At:
▼CVE Numbering Authority (CNA)

A privilege escalation vulnerability was reported in LenovoBatteryGaugePackage for Lenovo System Interface Foundation bundled in Lenovo Vantage prior to version 10.2003.10.0 that could allow an authenticated user to execute code with elevated privileges.

Affected Products
Vendor
Lenovo Group LimitedLenovo
Product
Vantage
Versions
Affected
  • From unspecified before 10.2003.10.0 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-428CWE-428 Unquoted Search Path or Element
Type: CWE
CWE ID: CWE-428
Description: CWE-428 Unquoted Search Path or Element
Metrics
VersionBase scoreBase severityVector
3.17.3HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 7.3
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

To update Vantage and its Lenovo System Interface Foundation component, follow these steps: 1) Update Lenovo Vantage to version 10.2003.10.0 from the Microsoft Store. 2) Re-launch Lenovo Vantage to complete the update.

Configurations

Workarounds

Exploits

Credits

Lenovo thanks Jonas Lykkegård for reporting this issue.
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://support.lenovo.com/us/en/product_security/LEN-30401
x_refsource_MISC
Hyperlink: https://support.lenovo.com/us/en/product_security/LEN-30401
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://support.lenovo.com/us/en/product_security/LEN-30401
x_refsource_MISC
x_transferred
Hyperlink: https://support.lenovo.com/us/en/product_security/LEN-30401
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:psirt@lenovo.com
Published At:14 Apr, 2020 | 21:15
Updated At:15 Apr, 2020 | 16:45

A privilege escalation vulnerability was reported in LenovoBatteryGaugePackage for Lenovo System Interface Foundation bundled in Lenovo Vantage prior to version 10.2003.10.0 that could allow an authenticated user to execute code with elevated privileges.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Secondary3.17.3HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Primary2.07.2HIGH
AV:L/AC:L/Au:N/C:C/I:C/A:C
Type: Primary
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 7.3
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 7.2
Base severity: HIGH
Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CPE Matches

Lenovo Group Limited
lenovo
>>vantage>>Versions before 10.2003.10.0(exclusive)
cpe:2.3:a:lenovo:vantage:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-269Primarynvd@nist.gov
CWE-428Secondarypsirt@lenovo.com
CWE ID: CWE-269
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-428
Type: Secondary
Source: psirt@lenovo.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://support.lenovo.com/us/en/product_security/LEN-30401psirt@lenovo.com
Vendor Advisory
Hyperlink: https://support.lenovo.com/us/en/product_security/LEN-30401
Source: psirt@lenovo.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

972Records found

CVE-2023-25496
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-7.8||HIGH
EPSS-0.03% / 8.12%
||
7 Day CHG~0.00%
Published-28 Apr, 2023 | 21:13
Updated-30 Jan, 2025 | 18:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A privilege escalation vulnerability was reported in Lenovo Drivers Management Lenovo Driver Manager that could allow a local user to execute code with elevated privileges.

Action-Not Available
Vendor-Lenovo Group Limited
Product-drivers_managementLenovo Drivers Management
CWE ID-CWE-284
Improper Access Control
CVE-2021-4212
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-6.7||MEDIUM
EPSS-0.11% / 30.01%
||
7 Day CHG~0.00%
Published-22 Apr, 2022 | 20:30
Updated-03 Aug, 2024 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A potential vulnerability in the SMI callback function used in the Legacy BIOS mode driver in some Lenovo Notebook models may allow an attacker with local access and elevated privileges to execute arbitrary code.

Action-Not Available
Vendor-Lenovo Group Limited
Product-ideapad_5_pro-16ihu6_firmwareideapad_gaming_3-15imh05_firmwarel340-17irh_firmwareideapad_5-14alc05ideapad_5-14alc05_firmwarel340-15iwl_touch_firmwareideapad_5_pro-16ihu6ideapad_gaming_3-15ach6legion_y545_firmwareslim_7-14itl05yoga_creator_7-15imh05e41-50_firmwareyoga_6-13alc6_firmwarel340-15iwl_firmwareflex-14imllegion_y545ideapad_5-15itl05_firmwareyoga_slim_7-15imh05yoga_slim_7-15iil05ideapad_3-14are05s540-14imlslim_7-14itl05_firmwarel340-17iwlyoga_creator_7-15imh05_firmwarelegion_y540-15irh-pg0_firmwareideapad_5-15itl05s340-14imllegion_y7000-2019-pg0ideapad_gaming_3-15imh05slim_7-14are05ideapad_3-17are05_firmwarethinkbook_plus_g2_itgideapad_3-15are05s340-13imlideapad_5_pro-14acn6yoga_slim_7-15imh05_firmwareideapad_5-14are05legion_y540-15irh-pg0ideapad_creator_5-15imh05s340-15apis340-15imlideapad_5_pro-14acn6_firmwareyoga_slim_7-14itl05_firmwareyoga_slim_7-15itl05v140-15iwl_firmwares540-14iml_firmwareideapad_gaming_3-15arh05_firmwares540-14iml_touchslim_7-14are05_firmwarelegion_y540-17irh-pg0_firmwareideapad_3-15are05_firmwareyoga_slim_7-14are05slim_7-15imh05d330-10igm_firmwarel340-15iwlideapad_5_pro-14itl6_firmwares340-14api_firmwares340-14apilegion_y540-17irhl340-15irhs340-15iml_firmwarelegion_y7000-2019-pg0_firmwareslim_7-15itl05_firmwarelegion_y545-pg0_firmwarev340-17iwls340-14iml_firmwarelegion_y7000-2019_firmwareideapad_gaming_3-15ach6_firmwareyoga_slim_7-14iil05yoga_slim_7_carbon_13itl5legion_y540-17irh_firmwareslim_7-15iil05yoga_6-13alc6ideapad_3-17are05yoga_slim_7-14iil05_firmwarel340-17iwl_firmwareyoga_slim_7_carbon_13itl5_firmwarec340-15imlideapad_5_pro-14itl6d330-10igmlegion_y540-17irh-pg0flex-15iml_firmwarethinkbook_13x_itgduet_3-10igl5thinkbook_13x_itg_firmwares340-13iml_firmwarev14-areyoga_slim_7-15iil05_firmwares340-15api_touchyoga_slim_7-14are05_firmwareflex-15imll340-15iwl_touchthinkbook_plus_g2_itg_firmwarev14-are_firmwarev340-17iwl_firmwares540-14iml_touch_firmwareideapad_creator_5-15imh05_firmwarec340-15iml_firmwareslim_7-15itl05ideapad_gaming_3-15arh05slim_7-15imh05_firmwareflex-14iml_firmwares340-15api_firmwareduet_3-10igl5_firmwarelegion_y540-15irh_firmwares340-15api_touch_firmwareslim_7-15iil05_firmwarelegion_y7000-2019c340-14imls540-15iml_firmwarethinkbook_14_g3_itl_firmwareyoga_slim_7-15itl05_firmwarelegion_y540-15irhe41-50yoga_slim_7-14itl05ideapad_3-14are05_firmwarec340-14iml_firmwares540-15imlideapad_5-14are05_firmwarev140-15iwll340-15irh_firmwarelegion_y545-pg0l340-17irhthinkbook_14_g3_itlBIOS
CWE ID-CWE-20
Improper Input Validation
CVE-2015-2219
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-29.58% / 96.45%
||
7 Day CHG~0.00%
Published-12 May, 2015 | 19:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Lenovo System Update (formerly ThinkVantage System Update) before 5.06.0034 uses predictable security tokens, which allows local users to gain privileges by sending a valid token with a command to the System Update service (SUService.exe) through an unspecified named pipe.

Action-Not Available
Vendor-n/aLenovo Group Limited
Product-system_updaten/a
CVE-2021-3969
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-7.8||HIGH
EPSS-0.42% / 60.98%
||
7 Day CHG~0.00%
Published-18 May, 2022 | 16:10
Updated-03 Aug, 2024 | 17:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Time of Check Time of Use (TOCTOU) vulnerability was reported in IMController, a software component of Lenovo System Interface Foundation, prior to version 1.1.20.3that could allow a local attacker to elevate privileges.

Action-Not Available
Vendor-Lenovo Group Limited
Product-system_interface_foundationIMController
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2024-4762
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-7.8||HIGH
EPSS-0.07% / 21.49%
||
7 Day CHG~0.00%
Published-16 Dec, 2024 | 17:04
Updated-16 Dec, 2024 | 17:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An improper validation vulnerability was reported in the firmware update mechanism of LADM and LDCC that could allow a local attacker to escalate privileges.

Action-Not Available
Vendor-Lenovo Group Limited
Product-Accessories and Display ManagerDisplay Control Center
CWE ID-CWE-295
Improper Certificate Validation
CVE-2024-4089
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-7.8||HIGH
EPSS-0.04% / 10.57%
||
7 Day CHG~0.00%
Published-11 Oct, 2024 | 15:15
Updated-17 Oct, 2024 | 19:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A DLL hijack vulnerability was reported in Lenovo Super File that could allow a local attacker to execute code with elevated privileges.

Action-Not Available
Vendor-Lenovo Group Limited
Product-superfileSuperFilesuperfile
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2020-8317
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-7.3||HIGH
EPSS-0.14% / 35.16%
||
7 Day CHG~0.00%
Published-24 Jul, 2020 | 16:10
Updated-17 Sep, 2024 | 00:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A DLL search path vulnerability was reported in Lenovo Drivers Management prior to version 2.7.1128.1046 that could allow an authenticated user to execute code with elevated privileges.

Action-Not Available
Vendor-Lenovo Group Limited
Product-drivers_managementDrivers Management
CWE ID-CWE-426
Untrusted Search Path
CVE-2019-6198
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-7.8||HIGH
EPSS-0.03% / 6.24%
||
7 Day CHG~0.00%
Published-31 Jul, 2024 | 20:30
Updated-02 Aug, 2024 | 18:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability was reported in Lenovo PC Manager prior to version 2.8.90.11211 that could allow a local attacker to escalate privileges.

Action-Not Available
Vendor-Lenovo Group Limited
Product-PC Managerpcmanager
CWE ID-CWE-287
Improper Authentication
CVE-2019-6195
Matching Score-6
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-6
Assigner-Lenovo Group Ltd.
CVSS Score-4.8||MEDIUM
EPSS-0.14% / 35.29%
||
7 Day CHG~0.00%
Published-14 Feb, 2020 | 17:10
Updated-16 Sep, 2024 | 16:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An authorization bypass exists in Lenovo XClarity Controller (XCC) versions prior to 3.08 CDI340V, 3.01 TEI392O, 1.71 PSI328N where a valid authenticated user with lesser privileges may be granted read-only access to higher-privileged information if 1) “LDAP Authentication Only with Local Authorization” mode is configured and used by XCC, and 2) a lesser privileged user logs into XCC within 1 minute of a higher privileged user logging out. The authorization bypass does not exist when “Local Authentication and Authorization” or “LDAP Authentication and Authorization” modes are configured and used by XCC.

Action-Not Available
Vendor-Lenovo Group Limited
Product-thinksystem_sr150thinksystem_sn550thinkagile_hx_3000thinksystem_st558thinksystem_sr158thinksystem_sr570thinkagile_vx_7000thinksystem_st250thinksystem_sr950_serverthinkagile_mx_sr650thinksystem_sr850thinkagile_vx_2000thinksystem_sr550thinksystem_sn850thinksystem_sd650_dwcthinksystem_sr530thinksystem_sr250thinksystem_sr630thinkagile_hx_7000thinksystem_st258thinkagile_vx_1000xclarity_controllerthinkagile_hx_2000thinkagile_hx_5000thinksystem_sd530thinkagile_vx_3000thinksystem_sr590thinksystem_sr860thinkagile_vx_5000thinkagile_hx_1000thinksystem_st550thinksystem_sr650thinksystem_sr258XClarity Controller (XCC)
CWE ID-CWE-264
Not Available
CWE ID-CWE-269
Improper Privilege Management
CVE-2023-4607
Matching Score-6
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-6
Assigner-Lenovo Group Ltd.
CVSS Score-7.5||HIGH
EPSS-0.17% / 38.51%
||
7 Day CHG~0.00%
Published-24 Oct, 2023 | 20:25
Updated-03 Dec, 2024 | 14:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An authenticated XCC user can change permissions for any user through a crafted API command.

Action-Not Available
Vendor-Lenovo Group Limited
Product-thinksystem_sn550thinksystem_sr530_firmwarethinkagile_hx3375_firmwarethinksystem_sr675_v3_firmwarethinkagile_hx5530thinksystem_sr570_firmwarethinksystem_sr665_firmwarethinksystem_sd630_v2_firmwarethinkagile_hx3721thinksystem_sr158thinksystem_sd665_v3_firmwarethinkagile_hx3520-g_firmwarethinkagile_hx3521-g_firmwarethinkagile_mx630_v3_intergrated_system_firmwarethinksystem_sr850_v3_firmwarethinksystem_sd650_dwc_dual_node_traythinksystem_st250thinkagile_vx1320_firmwarethinksystem_sr850thinksystem_sr158_firmwarethinkagile_vx3320_firmwarethinkagile_hx7530_firmwarethinkagile_hx2330thinkagile_vx7820thinksystem_sn850thinkagile_mx3331-f_all-flashthinkagile_vx7530_firmwarethinkagile_hx5520thinkagile_vx3320thinkagile_vx5520_firmwarethinksystem_st550_firmwarethinksystem_sr630thinkagile_mx1021_on_se350_firmwarethinksystem_sr950thinkagile_vx7320_nthinksystem_st658_v2thinkagile_hx1521-r_firmwarethinkagile_hx7820thinkagile_vx2320thinkagile_vx7520_nthinkagile_hx7520_firmwarethinkagile_vx_2u4nthinksystem_sr860_firmwarethinksystem_sr650_v2_firmwarethinkagile_hx5520-cthinksystem_sr630_v2thinksystem_sr860_v2thinkagile_hx_enclosure_firmwarethinkagile_hx3720thinkagile_hx7820_firmwarethinksystem_sd530thinksystem_sn850_firmwarethinkagile_mx1021_on_se350thinksystem_st650_v2thinkagile_vx_4u_firmwarethinksystem_sr258_v2thinkagile_hx7521_firmwarethinkagile_mx3531_h_hybrid_firmwarethinkagile_hx3375thinkagile_vx2320_firmwarethinkagile_mx3530-h_hybridthinkagile_vx3330thinkagile_hx2720-e_firmwarethinkagile_hx3331_firmwarethinkserver_sr590thinksystem_st250_firmwarethinksystem_sr645_v3thinkagile_hx3330_firmwarethinksystem_sr570thinksystem_sd650-n_v2thinksystem_sr670_v2_firmwarethinkagile_hx3321_firmwarethinkagile_vx7520thinksystem_sr670_v2thinkagile_vx_4uthinkagile_mx3331-h_hybridthinksystem_sr655_v3_firmwarethinkagile_hx2320-e_firmwarethinkagile_hx1331thinkagile_hx3331thinkagile_hx7521thinksystem_sd650_dual_node_traythinkagile_vx5520thinksystem_sr550thinkagile_mx3531-f_all-flash_firmwarethinkagile_mx650_v3_firmwarethinkagile_vx7530thinkagile_vx3520-g_firmwarethinksystem_se350_firmwarethinkagile_mx3330-f_all-flashthinksystem_st250_v2thinkagile_hx2321_firmwarethinksystem_sr860_v2_firmwarethinkagile_hx2321thinkagile_hx3721_firmwarethinksystem_st258thinkagile_mx3330-f_all-flash_firmwarethinksystem_sr850p_firmwarethinkagile_hx1320thinkagile_hx1321_firmwarethinksystem_sr850pthinkagile_hx1320_firmwarethinksystem_sn550_v2thinksystem_sd650_v3_firmwarethinksystem_sr258_v2_firmwarethinkagile_hx3320_firmwarethinkagile_hx3521-gthinkagile_hx2331_firmwarethinksystem_st650_v2_firmwarethinksystem_st258_v2_firmwarethinksystem_sd650_dwc_dual_node_tray_firmwarethinksystem_st258_firmwarethinkagile_hx3376_firmwarethinkagile_vx7531_firmwarethinkagile_vx2330thinkagile_vx7330_firmwarethinkagile_hx7821_firmwarethinksystem_sr850_firmwarethinkagile_vx3330_firmwarethinksystem_st550thinkagile_hx7531thinkagile_vx3520-gthinksystem_st658_v2_firmwarethinkagile_vx7531thinksystem_sr670_firmwarethinkagile_mx_edge-_mx1020_thinkagile_vx_2u4n_firmwarethinksystem_sr150thinkagile_mx3531_h_hybridthinksystem_sr850_v2_firmwarethinkagile_vx3720thinksystem_sr250_v2thinkagile_hx2330_firmwarethinksystem_sd650_v2_firmwarethinksystem_sr665_v3_firmwarethinkagile_mx3330-h_hybrid_firmwarethinkagile_hx_enclosurethinkagile_hx1321thinksystem_st250_v2_firmwarethinkagile_hx7520thinkagile_hx3330thinkedge_se450__firmwarethinksystem_sr645_v3_firmwarethinkagile_hx2720-ethinkagile_hx1331_firmwarethinksystem_sr650_firmwarethinksystem_sd650-n_v2_firmwarethinksystem_sn550_v2_firmwarethinksystem_sr860_v3_firmwarethinkagile_hx3321thinkagile_hx7530thinksystem_sr250thinksystem_sr530thinkagile_hx5520_firmwarethinkagile_mx3331-f_all-flash_firmwarethinksystem_sr850_v2thinksystem_se350thinkagile_mx3530_f_all_flashthinksystem_sr665thinksystem_sr150_firmwarethinkagile_hx1021_edgthinkagile_hx3520-gthinksystem_sr635_v3_firmwarethinkagile_vx7320_n_firmwarethinkagile_hx1021_edg_firmwarethinksystem_sr860thinkagile_hx7821thinkagile_hx3720_firmwarethinkagile_hx5521_firmwarethinkedge_se450thinkagile_mx3530_f_all_flash_firmwarethinksystem_sd650_dual_node_tray_firmwarethinkagile_mx3330-h_hybridthinkagile_hx5530_firmwarethinkagile_vx3331thinksystem_st258_v2thinkagile_vx7820_firmwarethinkagile_hx5520-c_firmwarethinksystem_st658_v3_firmwarethinksystem_sd530_firmwarethinkagile_vx_1sethinksystem_sr630_v3_firmwarethinkagile_hx5521-c_firmwarethinksystem_sd650_v2thinksystem_sr650_v2thinkagile_vx7330thinksystem_sn550_firmwarethinksystem_sr250_firmwarethinkagile_hx5521-cthinksystem_sr258_firmwarethinksystem_sr590_firmwarethinkagile_mx3530-h_hybrid_firmwarethinkagile_hx1520-rthinksystem_sd630_v2thinkagile_hx1521-rthinkagile_hx1520-r_firmwarethinkagile_hx3320thinkagile_vx3720_firmwarethinkagile_hx5531thinkagile_vx_1se_firmwarethinksystem_sr630_firmwarethinkagile_vx7520_n_firmwarethinksystem_sr650_v3_firmwarethinksystem_sr550_firmwarethinkagile_hx2331thinkagile_mx_edge-_mx1020__firmwarethinkagile_hx2320-ethinkagile_vx5530thinkagile_hx7531_firmwarethinkagile_mx630_v3_firmwarethinkagile_vx1320thinksystem_sr645thinksystem_sr670thinkagile_mx3531-f_all-flashthinkagile_vx3331_firmwarethinkagile_vx7520_firmwarethinksystem_sr950_firmwarethinkagile_vx2330_firmwarethinkagile_mx650_v3_intergrated_system_firmwarethinkagile_vx3530-g_firmwarethinksystem_sr630_v2_firmwarethinksystem_st650_v3_firmwarethinkagile_hx3376thinkagile_hx5531_firmwarethinkagile_vx5530_firmwarethinkagile_mx3331-h_hybrid_firmwarethinkagile_vx3530-gthinksystem_sr650thinksystem_sr258thinkagile_hx5521thinksystem_sr645_firmwareLenovo XClarity Controller (XCC)
CWE ID-CWE-269
Improper Privilege Management
CVE-2019-19705
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 12.23%
||
7 Day CHG~0.00%
Published-26 Dec, 2022 | 00:00
Updated-14 Apr, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Realtek Audio Drivers for Windows, as used on the Lenovo ThinkPad X1 Carbon 20A7, 20A8, 20BS, and 20BT before 6.0.8882.1 and 20KH and 20KG before 6.0.8907.1 (and on many other Lenovo and non-Lenovo products), mishandles DLL preloading.

Action-Not Available
Vendor-n/aLenovo Group Limited
Product-aio510-23ish_firmwareyangtian_mc_h110_pci_firmwareyangtian_mf\/wf_h110_pcithinkserver_ts250_firmwarethinkpad_t25yangtian_ytm6900e-00thinkcentre_m9500zaio_910-27ishthinkpad_yoga_11e_3rd_gensydney_e3_h110yangtian_mc_h110_firmwarethinkpad_p51s_firmwarethinkserver_ts450_firmwarethinkpad_l470_firmwarethinkcentre_m6600ideacentre_510s-08ishthinkpad_a475thinkpad_l480ideacentre_310-15iapthinkpad_l560yangtian_me\/we_h110thinkpad_t470sthinkpad_t460sthinkstation_p320thinkcentre_m900z_firmwarethinkpad_p50_firmwarethinkcentre_m818zthinkpad_t460pyangtian_mc_h110thinkcentre_e95zthinkcentre_m715qideacentre_310s-08iap_firmwareaio520-24iku_firmwareideacentre_620s-03ikl_firmwareaio520-22ikuthinkserver_ts150thinkstation_p320_tinyqt_a7400legion_y520t_z370_firmwarethinkpad_x1_carbonthinkpad_x1_carbon_firmwareideacentre_310-15asrthinkpad_13thinkpad_l570thinkpad_l390_yoga_firmwarethinkserver_ts250thinkpad_x260_firmwareideacentre_310-15iap_firmwareaio_y910-27ishaio520-24ikl_firmwarethinkcentre_m8600t\/sthinkpad_t580thinkpad_yoga_11e_3rd_gen_firmwarethinkpad_t25_firmwarethinkpad_s3_3rd_genthinkpad_l450thinkpad_x280thinkpad_l380thinkcentre_m710ethinkcentre_m910qthinkpad_p71thinkcentre_m715t\/sthinkserver_ts140thinkcentre_m900zthinkpad_p52syta8900f_firmwarethinkstation_p330_firmwarethinkpad_t480sideacentre_520s-23ikulenovo_v320-15iapideacentre_520s-23iku_firmwarethinkpad_t460aio310-20iapthinkcentre_m6600_firmwarethinkcentre_m910_t\/sthinkstation_p330_tinythinkcentre_m810zthinkcentre_e95z_firmwarelegion_y520t_z370thinkpad_t480_firmwarethinkcentre_m810z_firmwarethinkserver_ts150_firmwarethinkpad_x280_firmwareideacentre_310s-08iapthinkpad_t450sthinkcentre_x1_aio_firmwarethinkpad_l460legion_y720_tower_firmwarelenovo_v320-15iap_firmwarethinkstation_p330thinkcentre_m8300z_firmwarethinkpad_x270thinkpad_x250_firmwarethinkserver_ts550thinkcentre_e74zthinkcentre_m800aio520-22iklaio720-24ikb_firmwarethinkcentre_m6600t\/s_firmwareideacentre_620s-03iklthinkcentre_m910xthinkpad_l460_firmwareaio300-23isu_firmwarethinkcentre_m700q_firmwarethinkpad_l570_firmwarethinkpad_l580_firmwarev510z_\(yt_s5250\)_firmwarethinkcentre_m715q_firmwarethinkpad_x1_yogav410z\(yt_s4250\)thinkcentre_m710t\/s_firmwarethinkcentre_m710qthinkserver_ts450thinkpad_t480thinkcentre_m710q_firmwareaio520-24ikuthinkserver_ts240thinkpad_p71_firmwarethinkcentre_m8350zyangtian_afh110thinkcentre_m900thinkpad_t460_firmwarethinkpad_t560_firmwareaio_y910-27ish_firmwarethinkpad_t580_firmwarethinkpad_s3_3rd_gen_firmwareideacentre_510s-08iklthinkcentre_m8350z_firmwareideacentre_300s-11ish_firmwarev510z_\(yt_s5250\)aio520-24iklthinkserver_ts140_firmwarethinkpad_t470s_firmwarethinkcentre_m710t\/sthinkcentre_m700qthinkcentre_m700z_firmwarethinkcentre_m9550zthinkpad_p51_firmwareideacentre_610s-02ishaio520-22iku_firmwareideacentre_510s-08ikl_firmwarethinkpad_t560aio_910-27ish_firmwareaio300-23isuthinkpad_p50sthinkstation_p318_firmwarethinkcentre_m8300zaio510-23ishyangtian_me\/we_h110_firmwarethinkpad_x250thinkpad_t470ideacentre_510-15abrthinkcentre_m910zideacentre_700_firmwareideacentre_720-18asr_firmwarethinkstation_p310aio510-22ishlegion_y920_towerthinkcentre_m715t\/s_firmwarethinkcentre_m900_firmwareaio310-20iap_firmwarev410z\(yt_s4250\)_firmwarethinkcentre_m7300zthinkcentre_m800zaio520-22ikl_firmwareideacentre_610s-02ish_firmwareyangtian_ytm6900e-00_firmwareideacentre_510-15abr_firmwarethinkcentre_m710e_firmwareyangtian_afh110_firmwarethinkcentre_m910z_firmwarethinkstation_p320_firmwarethinkpad_13_firmwarethinkpad_yoga_11e_4th_genthinkpad_a275thinkpad_x1_tabletaio720-24ikbthinkpad_p70_firmwarethinkpad_s2_yoga_3rd_gen_firmwarethinkcentre_e74z_firmwarethinkpad_p51ideacentre_510s-08ish_firmwarethinkcentre_m6600t\/sthinkpad_t460s_firmwarethinkpad_t470pthinkpad_l580yangtian_afq150_firmwarethinkstation_p310_firmwarethinkcentre_m800_firmwarethinkpad_p50s_firmwarethinkpad_l450_firmwarethinkpad_x1_yoga_firmwaresydney_e3_h110_firmwarethinkstation_p318v310z\(yt_s3150\)_firmwareideacentre_310-15asr_firmwarethinkcentre_m910x_firmwarethinkcentre_m8600t\/s_firmwareyangtian_afq150legion_y720_towerthinkpad_t570_firmwarethinkpad_l560_firmwarethinkpad_t460p_firmwareyangtian_mf\/wf_h110_pci_firmwarethinkcentre_m700zthinkstation_p320_tiny_firmwarethinkpad_l380_firmwarethinkpad_x260ideacentre_720-18asrthinkcentre_m6600q_firmwareaio520-27iklthinkpad_x1_tablet_firmwareaio520-27ikl_firmwarethinkcentre_m700t\/sthinkpad_l480_firmwarethinkcentre_m7300z_firmwarethinkcentre_x1_aiothinkpad_l380_yogalegion_y720t_amdthinkpad_p50ideacentre_510-15ikl_firmwareyta8900fideacentre_300s-11ishthinkcentre_m818z_firmwarethinkpad_p52s_firmwarethinkpad_t570thinkpad_p51syangtian_tc\/wc_h110_pci_firmwareideacentre_700thinkpad_s2_yoga_4th_genthinkpad_t450s_firmwarethinkpad_t450_firmwarev310z\(yt_s3150\)thinkcentre_m800z_firmwarethinkcentre_m910_t\/s_firmwarethinkpad_t450thinkpad_t480s_firmwarethinkpad_s2_yoga_3rd_genideacentre_310a-15iap_firmwarethinkpad_t470p_firmwarethinkpad_yoga_11e_4th_gen_firmwarethinkpad_l13_yogathinkpad_a275_firmwareideacentre_510-15iklthinkpad_s2_yoga_4th_gen_firmwareaio510-22ish_firmwarethinkcentre_m6600qlegion_y920_tower_firmwarethinkpad_a475_firmwareyangtian_mc_h110_pcithinkpad_p70thinkserver_ts550_firmwarethinkpad_l470yangtian_tc\/wc_h110_pcithinkcentre_m9500z_firmwarethinkpad_l390_yogathinkpad_l13_yoga_firmwarethinkcentre_m9550z_firmwarethinkcentre_m700t\/s_firmwarethinkcentre_e74s_firmwareyangtian_s4150_firmwarethinkcentre_e74sthinkserver_ts240_firmwarethinkcentre_m910q_firmwarethinkpad_t470_firmwarelegion_y720t_amd_firmwarethinkstation_p330_tiny_firmwarethinkpad_l380_yoga_firmwareqt_a7400_firmwareideacentre_310a-15iapyangtian_s4150thinkpad_x270_firmwaren/a
CWE ID-CWE-428
Unquoted Search Path or Element
CVE-2023-29056
Matching Score-6
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-6
Assigner-Lenovo Group Ltd.
CVSS Score-5.3||MEDIUM
EPSS-0.15% / 36.31%
||
7 Day CHG~0.00%
Published-28 Apr, 2023 | 21:07
Updated-30 Jan, 2025 | 18:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A valid LDAP user, under specific conditions, will default to read-only permissions when authenticating into XCC. To be vulnerable, XCC must be configured to use an LDAP server for Authentication/Authorization and have the login permission attribute not defined.

Action-Not Available
Vendor-Lenovo Group Limited
Product-thinksystem_sn550thinksystem_sr530_firmwarethinkagile_hx3375_firmwarethinksystem_sr570_firmwarethinkagile_hx5530thinksystem_sr158thinkagile_hx3721thinksystem_sd630_v2_firmwarethinksystem_sr665_firmwarethinksystem_sd650thinkagile_hx3520-g_firmwarethinkagile_hx3521-g_firmwarethinkagile_mx3531_h_firmwarethinksystem_st250thinkagile_vx1320_firmwarethinksystem_sr850thinksystem_sr158_firmwarethinkagile_vx3320_firmwarethinkagile_hx7530_firmwarethinkagile_hx2330thinkagile_vx7820thinksystem_sn850thinkagile_hx5520thinkagile_vx7530_firmwarethinkedge_se450_thinkagile_vx3320thinkagile_vx5520_firmwarethinksystem_st550_firmwarethinksystem_sr630thinkagile_mx1021_on_se350_firmwarethinksystem_sr950thinkagile_vx7320_nthinksystem_st658_v2thinkagile_hx1521-r_firmwarethinkagile_hx7820thinkagile_vx2320thinkagile_vx7520_nthinkagile_hx7520_firmwarethinkagile_vx_2u4nthinksystem_sr860_firmwarethinksystem_sr650_v2_firmwarethinkagile_hx5520-cthinksystem_sr630_v2thinkagile_hx_enclosure_firmwarethinkagile_hx7820_firmwarethinkagile_hx3720thinksystem_sd530thinksystem_sr860_v2thinksystem_sn850_firmwarethinkagile_mx1021_on_se350thinkagile_vx_4u_firmwarethinksystem_st650_v2thinksystem_sr258_v2thinkagile_hx7521_firmwarethinkagile_hx1021thinkagile_hx3375thinkagile_vx2320_firmwarethinksystem_sr250_v2_firmwarethinkagile_vx3330thinkagile_mx3330-h_firmwarethinkagile_hx2720-e_firmwarethinkagile_hx3331_firmwarethinksystem_st250_firmwarethinksystem_sr645_v3thinkagile_hx3330_firmwarethinksystem_sr570thinksystem_sd650-n_v2thinkagile_vx7520thinkagile_hx3321_firmwarethinksystem_sr670_v2_firmwarethinksystem_sr670_v2thinkagile_vx_4uthinkagile_mx3331-f_firmwarethinkagile_hx2320-e_firmwarethinkagile_hx1331thinkagile_hx3331thinkagile_hx7521thinkagile_vx5520thinksystem_sr550thinkagile_mx3330-hthinkagile_vx7530thinkagile_vx3520-g_firmwarethinksystem_se350_firmwarethinkagile_mx3530-hthinksystem_sd650_firmwarethinksystem_st250_v2thinkagile_hx2321_firmwarethinkagile_hx2321thinkagile_hx3721_firmwarethinkagile_mx3330-f_firmwarethinksystem_sr860_v2_firmwarethinksystem_sr850p_firmwarethinksystem_st258thinkagile_hx1320thinkagile_hx1321_firmwarethinksystem_sr850pthinkagile_hx1320_firmwarethinksystem_sn550_v2thinkstation_p920_firmwarethinksystem_sr258_v2_firmwarethinkagile_hx3320_firmwarethinkagile_hx3521-gthinkagile_hx2331_firmwarethinkagile_mx3530_f_firmwarethinksystem_st650_v2_firmwarethinkagile_mx3330-fthinksystem_st258_v2_firmwarethinksystem_st258_firmwarethinkagile_hx3376_firmwarethinkagile_vx2330thinkagile_vx7330_firmwarethinkagile_vx7531_firmwarethinkagile_hx7821_firmwarethinksystem_sr850_firmwarethinkagile_vx3330_firmwarethinksystem_st550thinkagile_hx7531thinkagile_vx3520-gthinksystem_st658_v2_firmwarethinkagile_vx7531thinkagile_vx_2u4n_firmwarethinksystem_sr670_firmwarethinksystem_sr150thinkagile_vx3720thinksystem_sr850_v2_firmwarethinksystem_sr250_v2thinkagile_hx2330_firmwarethinksystem_sd650_v2_firmwarethinksystem_sr665_v3_firmwarethinkagile_mx3530-h_firmwarethinkagile_hx_enclosurethinkagile_hx1321thinksystem_st250_v2_firmwarethinkagile_hx7520thinkagile_hx3330thinkagile_mx3331-h_firmwarethinkedge_se450__firmwarethinksystem_sr645_v3_firmwarethinkagile_hx2720-ethinkagile_hx1331_firmwarethinksystem_sr650_firmwarethinksystem_sd650-n_v2_firmwarethinksystem_sn550_v2_firmwarethinkagile_hx3321thinkagile_hx7530thinksystem_sr250thinksystem_sr530thinkagile_hx5520_firmwarethinksystem_sr850_v2thinksystem_se350thinkagile_mx1020_firmwarethinkagile_mx1020thinksystem_sr665thinksystem_sr150_firmwarethinkagile_hx3520-gthinkagile_vx7320_n_firmwarethinksystem_sr860thinkagile_hx7821thinkagile_hx3720_firmwarethinkagile_hx5521_firmwarethinksystem_sr645_firmwarethinkagile_hx1021_firmwarethinkagile_hx5530_firmwarethinkagile_vx3331thinksystem_st258_v2thinkagile_vx7820_firmwarethinkagile_hx5520-c_firmwarethinksystem_sd530_firmwarethinkagile_vx_1sethinkagile_mx3331-hthinkagile_hx5521-c_firmwarethinksystem_sd650_v2thinkstation_p920thinksystem_sr650_v2thinkagile_vx7330thinksystem_sn550_firmwarethinkagile_hx5521-cthinksystem_sr250_firmwarethinksystem_sr258_firmwarethinksystem_sr590_firmwarethinkagile_mx3530_fthinkagile_hx1520-rthinksystem_sd630_v2thinkagile_hx1521-rthinkagile_hx1520-r_firmwarethinkagile_hx3320thinkagile_vx3720_firmwarethinkagile_hx5531thinkagile_vx_1se_firmwarethinksystem_sr630_firmwarethinkagile_vx7520_n_firmwarethinksystem_sr550_firmwarethinkagile_hx2331thinkagile_hx2320-ethinkagile_vx5530thinkagile_mx3331-fthinkagile_hx7531_firmwarethinkagile_vx1320thinksystem_sr645thinksystem_sr670thinksystem_sr590thinkagile_vx3331_firmwarethinkagile_vx7520_firmwarethinksystem_sr950_firmwarethinkagile_vx2330_firmwarethinkagile_vx3530-g_firmwarethinksystem_sr630_v2_firmwarethinksystem_sr665_v3thinkagile_hx3376thinkagile_hx5531_firmwarethinkagile_mx3531_hthinkagile_vx3530-gthinkagile_vx5530_firmwarethinksystem_sr650thinksystem_sr258thinkagile_hx5521thinkagile_mx3531-fthinkagile_mx3531-f_firmwareXClarity Controller
CWE ID-CWE-269
Improper Privilege Management
CVE-2016-8225
Matching Score-6
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-6
Assigner-Lenovo Group Ltd.
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.86%
||
7 Day CHG~0.00%
Published-26 Jan, 2017 | 17:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unquoted service path vulnerability in Lenovo Edge and Lenovo Slim USB Keyboard Driver versions earlier than 1.21 allows local users to execute code with elevated privileges.

Action-Not Available
Vendor-Lenovo Group Limited
Product-slim_usb_keyboard_driveredge_keyboard_driverEdge and Slim USB Keyboard Driver
CWE ID-CWE-428
Unquoted Search Path or Element
CVE-2020-8320
Matching Score-6
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-6
Assigner-Lenovo Group Ltd.
CVSS Score-6.4||MEDIUM
EPSS-0.05% / 13.71%
||
7 Day CHG~0.00%
Published-09 Jun, 2020 | 19:50
Updated-16 Sep, 2024 | 17:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An internal shell was included in BIOS image in some ThinkPad models that could allow escalation of privilege.

Action-Not Available
Vendor-Lenovo Group Limited
Product-thinkpad_t480_firmwarethinkpad_l460_firmwarethinkpad_p50_firmwarethinkpad_x1_carbon_firmwarethinkpad_s3_3rd_gen_firmwarethinkpad_e580_firmwarethinkpad_e490thinkpad_x260_firmwarethinkpad_e590_firmwarethinkpad_t570thinkpad_l560thinkpad_t490thinkpad_p51sthinkpad_x280_firmwarethinkpad_p73_firmwarethinkpad_t590thinkpad_p53thinkpad_e575thinkpad_p72_firmwarethinkpad_x1_tabletthinkpad_t495_firmwarethinkpad_l460thinkpad_l590thinkpad_p52thinkpad_e560p_firmwarethinkpad_l480thinkpad_e475thinkpad_s2_yoga_4th_genthinkpad_p70thinkpad_t460thinkpad_l390_yoga_firmwarethinkpad_x390_firmwarethinkpad_e470_firmwarethinkpad_r490_firmwarethinkpad_11ethinkpad_x270thinkpad_a285thinkpad_t460pthinkpad_e15_firmwarethinkpad_p1thinkpad_l580_firmwarethinkpad_e460thinkpad_x1_tablet_firmwarethinkpad_l1415_firmwarethinkpad_l380_yoga_firmwarethinkpad_x280thinkpad_x390thinkpad_p50s_firmwarethinkpad_r14thinkpad_yoga_370thinkpad_s3_gen_2_firmwarethinkpad_l470thinkpad_e570_firmwarethinkpad_l470_firmwarethinkpad_s5_firmwarethinkpad_s3_firmwarethinkpad_t490_firmwarethinkpad_x390_yoga_firmwarethinkpad_l380_firmwarethinkpad_r590_firmwarethinkpad_l380thinkpad_t560_firmwarethinkpad_t580thinkpad_t590_firmwarethinkpad_x1_yoga_firmwarethinkpad_l390_yogathinkpad_yoga_11e_4th_gen_firmwarethinkpad_x1_extremethinkpad_x1_yogathinkpad_l490_firmwarethinkpad_e485_firmwarethinkpad_yoga_11e_3rd_gen_firmwarethinkpad_s5_2nd_gen_firmwarethinkpad_x1_carbonthinkpad_e560_firmwarethinkpad_t460p_firmwarethinkpad_t570_firmwarethinkpad_l13_firmwarethinkpad_yoga_11e_5th_genthinkpad_p52s_firmwarethinkpad_r490thinkpad_13_firmwarethinkpad_a275_firmwarethinkpad_e585thinkpad_l570_firmwarethinkpad_e590thinkpad_a475_firmwarethinkpad_x380_yoga_firmwarethinkpad_a485_firmwarethinkpad_e575_firmwarethinkpad_13_2nd_genthinkpad_e490sthinkpad_t25_firmwarethinkpad_p1_firmwarethinkpad_11e_yoga_gen_6_firmwarethinkpad_p52_firmwarethinkpad_s2_yoga_4th_gen_firmwarethinkpad_a275thinkpad_t580_firmwarethinkpad_e15thinkpad_e485thinkpad_l480_firmwarethinkpad_x380_yogathinkpad_a485thinkpad_s2_yoga_3rd_gen_firmwarethinkpad_t25thinkpad_p53sthinkpad_t480sthinkpad_e465_firmwarethinkpad_t495sthinkpad_p51_firmwarethinkpad_t460sthinkpad_t495s_firmwarethinkpad_x390_yogathinkpad_e460_firmwarethinkpad_e455thinkpad_e14thinkpad_11e_firmwarethinkpad_e570thinkpad_s5_2nd_genthinkpad_l570thinkpad_e560thinkpad_p43sthinkpad_a475thinkpad_e555thinkpad_x1_extreme_firmwarethinkpad_t490s_firmwarethinkpad_e565thinkpad_e475_firmwarethinkpad_e565_firmwarethinkpad_t470s_firmwarethinkpad_l580thinkpad_p50thinkpad_r590thinkpad_yoga_11e_5th_gen_firmwarethinkpad_x395_firmwarethinkpad_e580thinkpad_r14_firmwarethinkpad_e490s_firmwarethinkpad_p71thinkpad_s3_gen_2thinkpad_s5thinkpad_t470p_firmwarethinkpad_e480_firmwarethinkpad_11e_yoga_gen_6thinkpad_p51s_firmwarethinkpad_s1_firmwarethinkpad_e490_firmwarethinkpad_p70_firmwarethinkpad_t560thinkpad_x395thinkpad_s1_3rd_firmwarethinkpad_t460_firmwarethinkpad_t460s_firmwarethinkpad_13thinkpad_t470thinkpad_yoga_11e_3rd_genthinkpad_p50sthinkpad_p53_firmwarethinkpad_x270_firmwarethinkpad_13_2nd_gen_firmwarethinkpad_s2_yoga_3rd_genthinkpad_s1_3rdthinkpad_s1thinkpad_e480thinkpad_l490thinkpad_l380_yogathinkpad_p51thinkpad_t480s_firmwarethinkpad_yoga_260thinkpad_s3thinkpad_s3_3rd_genthinkpad_p71_firmwarethinkpad_l13thinkpad_e585_firmwarethinkpad_t490sthinkpad_p73thinkpad_e555_firmwarethinkpad_e470thinkpad_yoga_11e_4th_genthinkpad_l590_firmwarethinkpad_e560pthinkpad_t470sthinkpad_p72thinkpad_t470pthinkpad_yoga_260_firmwarethinkpad_a285_firmwarethinkpad_e14_firmwarethinkpad_l1415thinkpad_l560_firmwarethinkpad_x260thinkpad_t495thinkpad_yoga_370_firmwarethinkpad_p53s_firmwarethinkpad_e465thinkpad_t480thinkpad_t470_firmwarethinkpad_p52sthinkpad_p43s_firmwarethinkpad_e455_firmwareBIOS
CWE ID-CWE-489
Active Debug Code
CWE ID-CWE-269
Improper Privilege Management
CVE-2017-9450
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.17% / 39.08%
||
7 Day CHG~0.00%
Published-30 Oct, 2017 | 14:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Amazon Web Services (AWS) CloudFormation bootstrap tools package (aka aws-cfn-bootstrap) before 1.4-19.10 allows local users to execute arbitrary code with root privileges by leveraging the ability to create files in an unspecified directory.

Action-Not Available
Vendor-amazonn/a
Product-amazon_web_services_cloudformation_bootstrapn/a
CWE ID-CWE-269
Improper Privilege Management
CVE-2024-55632
Matching Score-4
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-4
Assigner-Trend Micro, Inc.
CVSS Score-7.8||HIGH
EPSS-0.04% / 8.70%
||
7 Day CHG~0.00%
Published-31 Dec, 2024 | 16:16
Updated-31 Dec, 2024 | 17:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A security agent link following vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

Action-Not Available
Vendor-Trend Micro Incorporated
Product-Trend Micro Apex OneTrend Micro Apex One as a Service
CWE ID-CWE-269
Improper Privilege Management
CVE-2024-53706
Matching Score-4
Assigner-SonicWall, Inc.
ShareView Details
Matching Score-4
Assigner-SonicWall, Inc.
CVSS Score-7.8||HIGH
EPSS-0.03% / 7.06%
||
7 Day CHG~0.00%
Published-09 Jan, 2025 | 07:05
Updated-09 Jan, 2025 | 16:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the Gen7 SonicOS Cloud platform NSv, allows a remote authenticated local low-privileged attacker to elevate privileges to `root` and potentially lead to code execution.

Action-Not Available
Vendor-SonicWall Inc.
Product-SonicOS
CWE ID-CWE-269
Improper Privilege Management
CVE-2021-45440
Matching Score-4
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-4
Assigner-Trend Micro, Inc.
CVSS Score-7.8||HIGH
EPSS-0.06% / 19.19%
||
7 Day CHG~0.00%
Published-08 Jan, 2022 | 15:51
Updated-04 Aug, 2024 | 04:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A unnecessary privilege vulnerability in Trend Micro Apex One and Trend Micro Worry-Free Business Security 10.0 SP1 (on-prem versions only) could allow a local attacker to abuse an impersonation privilege and elevate to a higher level of privileges. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

Action-Not Available
Vendor-Microsoft CorporationTrend Micro Incorporated
Product-apex_onewindowsworry-free_business_securityworry-free_business_security_servicesTrend Micro Apex OneTrend Micro Worry-Free Business Security
CWE ID-CWE-269
Improper Privilege Management
CVE-2023-47145
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-8.4||HIGH
EPSS-0.01% / 2.04%
||
7 Day CHG~0.00%
Published-07 Jan, 2024 | 18:58
Updated-11 Jun, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM Db2 for Windows privilege escalation

IBM Db2 for Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5 could allow a local user to escalate their privileges to the SYSTEM user using the MSI repair functionality. IBM X-Force ID: 270402.

Action-Not Available
Vendor-IBM CorporationMicrosoft Corporation
Product-windowsdb2Db2db2
CWE ID-CWE-269
Improper Privilege Management
CVE-2017-18838
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.05% / 14.77%
||
7 Day CHG~0.00%
Published-20 Apr, 2020 | 15:58
Updated-05 Aug, 2024 | 21:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Certain NETGEAR devices are affected by privilege escalation. This affects M4300-28G before 12.0.2.15, M4300-52G before 12.0.2.15, M4300-28G-POE+ before 12.0.2.15, M4300-52G-POE+ before 12.0.2.15, M4300-8X8F before 12.0.2.15, M4300-12X12F before 12.0.2.15, M4300-24X24F before 12.0.2.15, M4300-24X before 12.0.2.15, M4300-48X before 12.0.2.15, and M4200 before 12.0.2.15.

Action-Not Available
Vendor-n/aNETGEAR, Inc.
Product-m4300-52g_firmwarem4300-52gm4300-12x12f_firmwarem4300-28gm4300-28g-poe\+m4300-48x_firmwarem4300-48xm4200m4300-52g-poe\+_firmwarem4300-8x8fm4300-24x_firmwarem4300-28g-poe\+_firmwarem4300-28g_firmwarem4300-52g-poe\+m4300-12x12fm4300-8x8f_firmwarem4200_firmwarem4300-24x24f_firmwarem4300-24x24fm4300-24xn/a
CWE ID-CWE-269
Improper Privilege Management
CVE-2024-52926
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.02% / 3.00%
||
7 Day CHG~0.00%
Published-18 Nov, 2024 | 00:00
Updated-06 Jan, 2025 | 17:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Delinea Privilege Manager before 12.0.2 mishandles the security of the Windows agent.

Action-Not Available
Vendor-Delineadelinea_privilege_manager
Product-Privilege Managerdelinea_privilege_manager
CWE ID-CWE-276
Incorrect Default Permissions
CWE ID-CWE-269
Improper Privilege Management
CVE-2024-52336
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-0.06% / 18.66%
||
7 Day CHG~0.00%
Published-26 Nov, 2024 | 15:21
Updated-01 Aug, 2025 | 15:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Tuned: `script_pre` and `script_post` options allow to pass arbitrary scripts executed by root

A script injection vulnerability was identified in the Tuned package. The `instance_create()` D-Bus function can be called by locally logged-in users without authentication. This flaw allows a local non-privileged user to execute a D-Bus call with `script_pre` or `script_post` options that permit arbitrary scripts with their absolute paths to be passed. These user or attacker-controlled executable scripts or programs could then be executed by Tuned with root privileges that could allow attackers to local privilege escalation.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Fast Datapath for Red Hat Enterprise Linux 9Red Hat Enterprise Linux 7Fast Datapath for Red Hat Enterprise Linux 8Red Hat Enterprise Linux 6Red Hat Enterprise Linux 9Fast Datapath for RHEL 7Red Hat Enterprise Linux 8Red Hat Enterprise Linux 10
CWE ID-CWE-269
Improper Privilege Management
CVE-2021-45819
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-0.04% / 8.76%
||
7 Day CHG~0.00%
Published-03 Mar, 2022 | 14:04
Updated-04 Aug, 2024 | 04:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Wordline HIDCCEMonitorSVC before v5.2.4.3 contains an unquoted service path which allows attackers to escalate privileges to the system level.

Action-Not Available
Vendor-wordlinen/a
Product-hidccemonitorsvcn/a
CWE ID-CWE-428
Unquoted Search Path or Element
CVE-2017-6894
Matching Score-4
Assigner-Flexera Software LLC
ShareView Details
Matching Score-4
Assigner-Flexera Software LLC
CVSS Score-7.8||HIGH
EPSS-0.03% / 5.84%
||
7 Day CHG~0.00%
Published-29 Mar, 2023 | 00:00
Updated-18 Feb, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability exists in FlexNet Manager Suite releases 2015 R2 SP3 and earlier (including FlexNet Manager Platform 9.2 and earlier) that affects the inventory gathering components and can be exploited by local users to perform certain actions with elevated privileges on the local system.

Action-Not Available
Vendor-flexeran/a
Product-flexnet_manager_suite_2015flexnet_managern/a
CWE ID-CWE-269
Improper Privilege Management
CVE-2017-5671
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-0.51% / 65.26%
||
7 Day CHG~0.00%
Published-29 Mar, 2017 | 14:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Honeywell Intermec PM23, PM42, PM43, PC23, PC43, PD43, and PC42 industrial printers before 10.11.013310 and 10.12.x before 10.12.013309 have /usr/bin/lua installed setuid to the itadmin account, which allows local users to conduct a BusyBox jailbreak attack and obtain root privileges by overwriting the /etc/shadow file.

Action-Not Available
Vendor-n/aHoneywell International Inc.
Product-intermec_pc43_firmwareintermec_pm43intermec_pm43_firmwareintermec_pd43_firmwareintermec_pm23_firmwareintermec_pc42_firmwareintermec_pc43intermec_pm23intermec_pd43intermec_pm42intermec_pc42intermec_pc23_firmwareintermec_pc23intermec_pm42_firmwaren/a
CWE ID-CWE-269
Improper Privilege Management
CVE-2017-5736
Matching Score-4
Assigner-Intel Corporation
ShareView Details
Matching Score-4
Assigner-Intel Corporation
CVSS Score-8.8||HIGH
EPSS-0.05% / 13.68%
||
7 Day CHG~0.00%
Published-20 Mar, 2018 | 20:00
Updated-16 Sep, 2024 | 23:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An elevation of privilege in Intel Software Guard Extensions Platform Software Component before 1.9.105.42329 allows a local attacker to execute arbitrary code as administrator.

Action-Not Available
Vendor-Intel Corporation
Product-software_guard_extensions_platform_software_componentSoftware Guard Extensions Platform Software Component
CWE ID-CWE-269
Improper Privilege Management
CVE-2019-3735
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-7||HIGH
EPSS-0.03% / 7.99%
||
7 Day CHG~0.00%
Published-20 Jun, 2019 | 21:43
Updated-17 Sep, 2024 | 00:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell SupportAssist for Business PCs version 2.0 and Dell SupportAssist for Home PCs version 2.2, 2.2.1, 2.2.2, 2.2.3, 3.0, 3.0.1, 3.0.2, 3.1, 3.2, and 3.2.1 contain an Improper Privilege Management Vulnerability. A malicious local user can exploit this vulnerability by inheriting a system thread using a leaked thread handle to gain system privileges on the affected machine.

Action-Not Available
Vendor-Dell Inc.
Product-supportassist_for_business_pcssupportassist_for_home_pcsDell SupportAssist for Home PCsDell SupportAssist for Business PCs
CWE ID-CWE-269
Improper Privilege Management
CVE-2017-14329
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 8.83%
||
7 Day CHG~0.00%
Published-23 Oct, 2017 | 08:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Extreme EXOS 16.x, 21.x, and 22.x allows administrators to obtain a root shell via vectors involving an exsh debug shell.

Action-Not Available
Vendor-extremenetworksn/a
Product-extremexosn/a
CWE ID-CWE-269
Improper Privilege Management
CVE-2017-6015
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.8||HIGH
EPSS-0.05% / 16.51%
||
7 Day CHG~0.00%
Published-11 May, 2018 | 13:00
Updated-16 Sep, 2024 | 21:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Without quotation marks, any whitespace in the file path for Rockwell Automation FactoryTalk Activation version 4.00.02 remains ambiguous, which may allow an attacker to link to or run a malicious executable. This may allow an authorized, but not privileged local user to execute arbitrary code with elevated privileges on the system. CVSS v3 base score: 8.8, CVSS vector string: (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). Rockwell Automation has released a new version of FactoryTalk Activation, Version 4.01, which addresses the identified vulnerability. Rockwell Automation recommends upgrading to the latest version of FactoryTalk Activation, Version 4.01 or later.

Action-Not Available
Vendor-Rockwell Automation, Inc.
Product-factorytalk_activationFactoryTalk Activation
CWE ID-CWE-428
Unquoted Search Path or Element
CWE ID-CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CVE-2017-5623
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.6||MEDIUM
EPSS-0.05% / 14.70%
||
7 Day CHG~0.00%
Published-19 Mar, 2017 | 20:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in OxygenOS before 4.1.0 on OnePlus 3 and 3T devices. The attacker can change the bootmode of the device by issuing the 'fastboot oem boot_mode {rf/wlan/ftm/normal} command' in contradiction to the threat model of Android where the bootloader MUST NOT allow any security-sensitive operation to be run unless the bootloader is unlocked.

Action-Not Available
Vendor-oneplusn/a
Product-oxygenosoneplus_3oneplus_3tn/a
CWE ID-CWE-269
Improper Privilege Management
CVE-2021-43463
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.10% / 29.04%
||
7 Day CHG~0.00%
Published-04 Apr, 2022 | 15:46
Updated-04 Aug, 2024 | 03:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An Unquoted Service Path vulnerability exists in Ext2Fsd v0.68 via a specially crafted file in the Ext2Srv Service executable service path.

Action-Not Available
Vendor-ext2_file_system_driver_projectn/a
Product-ext2_file_system_drivern/a
CWE ID-CWE-428
Unquoted Search Path or Element
CVE-2017-5207
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 9.52%
||
7 Day CHG~0.00%
Published-23 Mar, 2017 | 16:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Firejail before 0.9.44.4, when running a bandwidth command, allows local users to gain root privileges via the --shell argument.

Action-Not Available
Vendor-firejail_projectn/a
Product-firejailn/a
CWE ID-CWE-269
Improper Privilege Management
CVE-2021-43454
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.15% / 36.16%
||
7 Day CHG~0.00%
Published-04 Apr, 2022 | 14:01
Updated-04 Aug, 2024 | 03:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An Unquoted Service Path vulnerability exists in AnyTXT Searcher 1.2.394 via a specially crafted file in the ATService path. .

Action-Not Available
Vendor-anytxtn/a
Product-anytxt_searchern/a
CWE ID-CWE-428
Unquoted Search Path or Element
CVE-2021-43458
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.08% / 24.05%
||
7 Day CHG~0.00%
Published-04 Apr, 2022 | 14:53
Updated-04 Aug, 2024 | 03:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An Unquoted Service Path vulnerability exits in Vembu BDR 4.2.0.1 via a specially crafted file in the (1) hsflowd, (2) VembuBDR360Agent, or (3) VembuOffice365Agent service paths.

Action-Not Available
Vendor-vembun/a
Product-bdr_suiten/a
CWE ID-CWE-428
Unquoted Search Path or Element
CVE-2021-43457
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.08% / 24.05%
||
7 Day CHG~0.00%
Published-04 Apr, 2022 | 14:45
Updated-04 Aug, 2024 | 03:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An Unquoted Service Path vulnerability exists in bVPN 2.5.1 via a specially crafted file in the waselvpnserv service path.

Action-Not Available
Vendor-bvpnn/a
Product-bvpnn/a
CWE ID-CWE-428
Unquoted Search Path or Element
CVE-2024-48903
Matching Score-4
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-4
Assigner-Trend Micro, Inc.
CVSS Score-7.8||HIGH
EPSS-0.04% / 9.71%
||
7 Day CHG~0.00%
Published-22 Oct, 2024 | 18:28
Updated-31 Jul, 2025 | 16:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An improper access control vulnerability in Trend Micro Deep Security Agent 20 could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

Action-Not Available
Vendor-Microsoft CorporationTrend Micro Incorporated
Product-windowsdeep_security_agentTrend Micro Deep Security Agentdeep_security_agent
CWE ID-CWE-269
Improper Privilege Management
CVE-2023-47201
Matching Score-4
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-4
Assigner-Trend Micro, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 8.81%
||
7 Day CHG~0.00%
Published-23 Jan, 2024 | 20:38
Updated-29 Aug, 2024 | 20:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A plug-in manager origin validation vulnerability in the Trend Micro Apex One security agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to, but not identical to, CVE-2023-47200.

Action-Not Available
Vendor-Trend Micro Incorporated
Product-apex_oneTrend Micro Apex OneTrend Micro Apex One as a Serviceapex_one
CWE ID-CWE-269
Improper Privilege Management
CVE-2021-44020
Matching Score-4
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-4
Assigner-Trend Micro, Inc.
CVSS Score-7.8||HIGH
EPSS-0.06% / 19.19%
||
7 Day CHG~0.00%
Published-03 Dec, 2021 | 10:50
Updated-04 Aug, 2024 | 04:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An unnecessary privilege vulnerability in Trend Micro Worry-Free Business Security 10.0 SP1 could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to but not identical to CVE-2021-44019 and 44021.

Action-Not Available
Vendor-Trend Micro Incorporated
Product-worry-free_business_securityTrend Micro Worry-Free Business Security
CWE ID-CWE-269
Improper Privilege Management
CVE-2017-3757
Matching Score-4
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-4
Assigner-Lenovo Group Ltd.
CVSS Score-7.8||HIGH
EPSS-0.04% / 11.45%
||
7 Day CHG~0.00%
Published-28 Aug, 2017 | 20:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An unquoted service path vulnerability was identified in the driver for the ElanTech Touchpad, various versions, used on some Lenovo brand notebooks (not ThinkPads). This could allow an attacker with local privileges to execute code with administrative privileges.

Action-Not Available
Vendor-ELAN Microelectronics CorporationLenovo Group Limited
Product-elan_touchpad_driverLenovo ElanTech Touchpad driver
CWE ID-CWE-428
Unquoted Search Path or Element
CVE-2017-3005
Matching Score-4
Assigner-Adobe Systems Incorporated
ShareView Details
Matching Score-4
Assigner-Adobe Systems Incorporated
CVSS Score-7.8||HIGH
EPSS-0.39% / 59.33%
||
7 Day CHG~0.00%
Published-12 Apr, 2017 | 14:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Adobe Photoshop versions CC 2017 (18.0.1) and earlier, CC 2015.5.1 (17.0.1) and earlier have an unquoted search path vulnerability.

Action-Not Available
Vendor-n/aAdobe Inc.Microsoft Corporation
Product-windowsphotoshop_ccAdobe Photoshop CC 2017 (18.0.1) and earlier, CC 2015.5.1 (17.0.1) and earlier.
CWE ID-CWE-428
Unquoted Search Path or Element
CVE-2021-42104
Matching Score-4
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-4
Assigner-Trend Micro, Inc.
CVSS Score-7.8||HIGH
EPSS-0.12% / 32.22%
||
7 Day CHG~0.00%
Published-21 Oct, 2021 | 07:46
Updated-04 Aug, 2024 | 03:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unnecessary privilege vulnerabilities in Trend Micro Apex One, Apex One as a Service, Worry-Free Business Security 10.0 SP1 and Worry-Free Business Security Services could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to but not identical to CVE-2021-42105, 42106 and 42107.

Action-Not Available
Vendor-Microsoft CorporationTrend Micro Incorporated
Product-apex_onewindowsworry-free_business_securityworry-free_business_security_servicesTrend Micro Apex OneTrend Micro Worry-Free Business Security
CWE ID-CWE-269
Improper Privilege Management
CVE-2021-42286
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.20% / 42.02%
||
7 Day CHG~0.00%
Published-10 Nov, 2021 | 00:47
Updated-18 Nov, 2024 | 20:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Core Shell SI Host Extension Framework for Composable Shell Elevation of Privilege Vulnerability

Windows Core Shell SI Host Extension Framework for Composable Shell Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_serverwindows_10windows_server_2016Windows 10 Version 2004Windows Server version 2004Windows 10 Version 21H1Windows Server version 20H2Windows 10 Version 20H2
CWE ID-CWE-269
Improper Privilege Management
CVE-2021-42107
Matching Score-4
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-4
Assigner-Trend Micro, Inc.
CVSS Score-7.8||HIGH
EPSS-0.12% / 32.22%
||
7 Day CHG~0.00%
Published-21 Oct, 2021 | 07:46
Updated-04 Aug, 2024 | 03:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unnecessary privilege vulnerabilities in Trend Micro Apex One, Apex One as a Service, Worry-Free Business Security 10.0 SP1 and Worry-Free Business Security Services could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to but not identical to CVE-2021-42104, 42105 and 42106.

Action-Not Available
Vendor-Microsoft CorporationTrend Micro Incorporated
Product-apex_onewindowsworry-free_business_securityworry-free_business_security_servicesTrend Micro Apex OneTrend Micro Worry-Free Business Security
CWE ID-CWE-269
Improper Privilege Management
CVE-2021-42563
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.05% / 15.49%
||
7 Day CHG~0.00%
Published-12 Nov, 2021 | 20:48
Updated-04 Aug, 2024 | 03:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

There is an Unquoted Service Path in NI Service Locator (nisvcloc.exe) in versions prior to 18.0 on Windows. This may allow an authorized local user to insert arbitrary code into the unquoted service path and escalate privileges.

Action-Not Available
Vendor-nin/aMicrosoft Corporation
Product-windowsni_service_locatorn/a
CWE ID-CWE-428
Unquoted Search Path or Element
CVE-2023-46277
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 18.43%
||
7 Day CHG~0.00%
Published-20 Oct, 2023 | 00:00
Updated-12 Sep, 2024 | 15:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

please (aka pleaser) through 0.5.4 allows privilege escalation through the TIOCSTI and/or TIOCLINUX ioctl. (If both TIOCSTI and TIOCLINUX are disabled, this cannot be exploited.)

Action-Not Available
Vendor-ednevillen/aedneville
Product-pleasen/aplease
CWE ID-CWE-269
Improper Privilege Management
CVE-2021-42108
Matching Score-4
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-4
Assigner-Trend Micro, Inc.
CVSS Score-7.8||HIGH
EPSS-0.12% / 32.22%
||
7 Day CHG~0.00%
Published-21 Oct, 2021 | 07:46
Updated-04 Aug, 2024 | 03:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unnecessary privilege vulnerabilities in the Web Console of Trend Micro Apex One, Apex One as a Service and Worry-Free Business Security 10.0 SP1 could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

Action-Not Available
Vendor-Microsoft CorporationTrend Micro Incorporated
Product-apex_onewindowsworry-free_business_securityworry-free_business_security_servicesTrend Micro Apex OneTrend Micro Worry-Free Business Security
CWE ID-CWE-269
Improper Privilege Management
CVE-2021-42283
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-8.8||HIGH
EPSS-0.15% / 35.56%
||
7 Day CHG~0.00%
Published-10 Nov, 2021 | 00:47
Updated-04 Aug, 2024 | 03:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
NTFS Elevation of Privilege Vulnerability

NTFS Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_serverwindows_server_2016windows_server_2012windows_rt_8.1windows_7windows_11windows_10windows_server_2022windows_server_2019windows_server_2008Windows Server 2022Windows 10 Version 1607Windows Server version 2004Windows 10 Version 21H1Windows Server 2019 (Server Core installation)Windows Server 2008 Service Pack 2Windows 10 Version 1809Windows Server 2016 (Server Core installation)Windows 11 version 21H2Windows 8.1Windows 7Windows Server version 20H2Windows Server 2012 (Server Core installation)Windows 10 Version 1909Windows 7 Service Pack 1Windows 10 Version 20H2Windows Server 2016Windows 10 Version 2004Windows 10 Version 1507Windows Server 2008 R2 Service Pack 1Windows Server 2008 Service Pack 2 (Server Core installation)Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2012 R2Windows Server 2019Windows Server 2012Windows Server 2008 Service Pack 2Windows Server 2012 R2 (Server Core installation)
CWE ID-CWE-269
Improper Privilege Management
CVE-2017-18822
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.06%
||
7 Day CHG~0.00%
Published-20 Apr, 2020 | 16:44
Updated-05 Aug, 2024 | 21:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Certain NETGEAR devices are affected by vertical privilege escalation. This affects M4300-28G before 12.0.2.15, M4300-52G before 12.0.2.15, M4300-28G-POE+ before 12.0.2.15, M4300-52G-POE+ before 12.0.2.15, M4300-8X8F before 12.0.2.15, M4300-12X12F before 12.0.2.15, M4300-24X24F before 12.0.2.15, M4300-24X before 12.0.2.15, M4300-48X before 12.0.2.15, and M4200 before 12.0.2.15.

Action-Not Available
Vendor-n/aNETGEAR, Inc.
Product-m4300-52g_firmwarem4300-52gm4300-12x12f_firmwarem4300-28gm4300-28g-poe\+m4300-48x_firmwarem4300-48xm4200m4300-52g-poe\+_firmwarem4300-8x8fm4300-24x_firmwarem4300-28g-poe\+_firmwarem4300-28g_firmwarem4300-52g-poe\+m4300-12x12fm4300-8x8f_firmwarem4200_firmwarem4300-24x24f_firmwarem4300-24x24fm4300-24xn/a
CWE ID-CWE-269
Improper Privilege Management
CVE-2021-42322
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.19% / 41.48%
||
7 Day CHG~0.00%
Published-10 Nov, 2021 | 00:47
Updated-04 Aug, 2024 | 03:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Visual Studio Code Elevation of Privilege Vulnerability

Visual Studio Code Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-visual_studio_codeVisual Studio Code
CWE ID-CWE-269
Improper Privilege Management
CVE-2021-42082
Matching Score-4
Assigner-Dutch Institute for Vulnerability Disclosure (DIVD)
ShareView Details
Matching Score-4
Assigner-Dutch Institute for Vulnerability Disclosure (DIVD)
CVSS Score-7.8||HIGH
EPSS-0.03% / 7.54%
||
7 Day CHG~0.00%
Published-10 Jul, 2023 | 06:29
Updated-11 Mar, 2025 | 13:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Local Privilege Escalation to root in OSNEXUS QuantaStor before 6.0.0.355

Local users are able to execute scripts under root privileges.

Action-Not Available
Vendor-osnexusOSNEXUS
Product-quantastorQuantaStor
CWE ID-CWE-269
Improper Privilege Management
  • Previous
  • 1
  • 2
  • 3
  • 4
  • ...
  • 19
  • 20
  • Next
Details not found