Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2020-8333

Summary
Assigner-lenovo
Assigner Org ID-da227ddf-6e25-4b41-b023-0f976dcaca4b
Published At-24 Sep, 2020 | 21:05
Updated At-16 Sep, 2024 | 17:38
Rejected At-
Credits

A potential vulnerability in the SMI callback function used in the EEPROM driver in some Lenovo Desktops and ThinkStation models may allow arbitrary code execution

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:lenovo
Assigner Org ID:da227ddf-6e25-4b41-b023-0f976dcaca4b
Published At:24 Sep, 2020 | 21:05
Updated At:16 Sep, 2024 | 17:38
Rejected At:
▼CVE Numbering Authority (CNA)

A potential vulnerability in the SMI callback function used in the EEPROM driver in some Lenovo Desktops and ThinkStation models may allow arbitrary code execution

Affected Products
Vendor
Lenovo Group LimitedLenovo
Product
BIOS
Versions
Affected
  • various
Problem Types
TypeCWE IDDescription
textN/AArbitrary code execution
Type: text
CWE ID: N/A
Description: Arbitrary code execution
Metrics
VersionBase scoreBase severityVector
3.16.4MEDIUM
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 6.4
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Update system firmware to the version (or newer) indicated for your model in the Product Impact section of LEN-30042.

Configurations

Workarounds

Exploits

Credits

Lenovo thanks yngwei (@yngweijw), driedfish (@d3af1sh), and MengHao, Li of IIE VARAS
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://support.lenovo.com/us/en/product_security/LEN-30042
x_refsource_MISC
Hyperlink: https://support.lenovo.com/us/en/product_security/LEN-30042
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://support.lenovo.com/us/en/product_security/LEN-30042
x_refsource_MISC
x_transferred
Hyperlink: https://support.lenovo.com/us/en/product_security/LEN-30042
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:psirt@lenovo.com
Published At:24 Sep, 2020 | 21:15
Updated At:07 Oct, 2020 | 01:15

A potential vulnerability in the SMI callback function used in the EEPROM driver in some Lenovo Desktops and ThinkStation models may allow arbitrary code execution

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Secondary3.16.4MEDIUM
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
Primary2.07.2HIGH
AV:L/AC:L/Au:N/C:C/I:C/A:C
Type: Primary
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 6.4
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 7.2
Base severity: HIGH
Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CPE Matches

Lenovo Group Limited
lenovo
>>63>>-
cpe:2.3:h:lenovo:63:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>63_firmware>>Versions before fckt98a(exclusive)
cpe:2.3:o:lenovo:63_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>h50-30g>>-
cpe:2.3:h:lenovo:h50-30g:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>h50-30g_firmware>>Versions before fckt98a(exclusive)
cpe:2.3:o:lenovo:h50-30g_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>m4500>>-
cpe:2.3:h:lenovo:m4500:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>m4500_firmware>>Versions before fckt98a(exclusive)
cpe:2.3:o:lenovo:m4500_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>m4550>>-
cpe:2.3:h:lenovo:m4550:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>m4550_firmware>>Versions before fckt98a(exclusive)
cpe:2.3:o:lenovo:m4550_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>qitian_4500>>-
cpe:2.3:h:lenovo:qitian_4500:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>qitian_4500_firmware>>Versions before fckt98a(exclusive)
cpe:2.3:o:lenovo:qitian_4500_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>qitian_b4550>>-
cpe:2.3:h:lenovo:qitian_b4550:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>qitian_b4550_firmware>>Versions before fckt98a(exclusive)
cpe:2.3:o:lenovo:qitian_b4550_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>qitian_m4550>>-
cpe:2.3:h:lenovo:qitian_m4550:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>qitian_m4550_firmware>>Versions before fckt98a(exclusive)
cpe:2.3:o:lenovo:qitian_m4550_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_e73>>-
cpe:2.3:h:lenovo:thinkcentre_e73:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_e73_firmware>>Versions before fckt98a(exclusive)
cpe:2.3:o:lenovo:thinkcentre_e73_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_e73s_firmware>>Versions before fckt98a(exclusive)
cpe:2.3:o:lenovo:thinkcentre_e73s_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_e73s>>-
cpe:2.3:h:lenovo:thinkcentre_e73s:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_e93_firmware>>Versions before fbktdea(exclusive)
cpe:2.3:o:lenovo:thinkcentre_e93_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_e93>>-
cpe:2.3:h:lenovo:thinkcentre_e93:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m4500k_firmware>>Versions before fckt98a(exclusive)
cpe:2.3:o:lenovo:thinkcentre_m4500k_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m4500k>>-
cpe:2.3:h:lenovo:thinkcentre_m4500k:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m4500q_firmware>>Versions before fhkt85a(exclusive)
cpe:2.3:o:lenovo:thinkcentre_m4500q_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m4500q>>-
cpe:2.3:h:lenovo:thinkcentre_m4500q:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m4500t_firmware>>Versions before fckt98a(exclusive)
cpe:2.3:o:lenovo:thinkcentre_m4500t_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m4500t>>-
cpe:2.3:h:lenovo:thinkcentre_m4500t:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m4500s_firmware>>Versions before fckt98a(exclusive)
cpe:2.3:o:lenovo:thinkcentre_m4500s_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m4500s>>-
cpe:2.3:h:lenovo:thinkcentre_m4500s:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>yangtian_afh81_firmware>>Versions before fckt98a(exclusive)
cpe:2.3:o:lenovo:yangtian_afh81_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>yangtian_afh81>>-
cpe:2.3:h:lenovo:yangtian_afh81:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>yangtian_mc_h81_firmware>>Versions before fckt98a(exclusive)
cpe:2.3:o:lenovo:yangtian_mc_h81_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>yangtian_mc_h81>>-
cpe:2.3:h:lenovo:yangtian_mc_h81:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>yangtian_mf_h81_pci_firmware>>Versions before fckt98a(exclusive)
cpe:2.3:o:lenovo:yangtian_mf_h81_pci_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>yangtian_mf_h81_pci>>-
cpe:2.3:h:lenovo:yangtian_mf_h81_pci:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>yangtian_wf_h81_pci_firmware>>Versions before fckt98a(exclusive)
cpe:2.3:o:lenovo:yangtian_wf_h81_pci_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>yangtian_wf_h81_pci>>-
cpe:2.3:h:lenovo:yangtian_wf_h81_pci:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>yangtian_tc_h81_pci_firmware>>Versions before fckt98a(exclusive)
cpe:2.3:o:lenovo:yangtian_tc_h81_pci_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>yangtian_tc_h81_pci>>-
cpe:2.3:h:lenovo:yangtian_tc_h81_pci:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>yangtian_wcc_h81_pci_firmware>>Versions before fckt98a(exclusive)
cpe:2.3:o:lenovo:yangtian_wcc_h81_pci_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>yangtian_wcc_h81_pci>>-
cpe:2.3:h:lenovo:yangtian_wcc_h81_pci:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m9350z_firmware>>Versions before fekta2a(exclusive)
cpe:2.3:o:lenovo:thinkcentre_m9350z_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m9350z>>-
cpe:2.3:h:lenovo:thinkcentre_m9350z:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m93z_firmware>>Versions before fekta2a(exclusive)
cpe:2.3:o:lenovo:thinkcentre_m93z_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m93z>>-
cpe:2.3:h:lenovo:thinkcentre_m93z:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkstation_c30_firmware>>Versions before a3kt70a(exclusive)
cpe:2.3:o:lenovo:thinkstation_c30_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkstation_c30>>-
cpe:2.3:h:lenovo:thinkstation_c30:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkstation_d30>>-
cpe:2.3:h:lenovo:thinkstation_d30:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkstation_d30_firmware>>Versions before a3kt70a(exclusive)
cpe:2.3:o:lenovo:thinkstation_d30_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkstation_e32_firmware>>Versions before fbktdea(exclusive)
cpe:2.3:o:lenovo:thinkstation_e32_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkstation_e32>>-
cpe:2.3:h:lenovo:thinkstation_e32:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-noinfoPrimarynvd@nist.gov
CWE ID: NVD-CWE-noinfo
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://support.lenovo.com/us/en/product_security/LEN-30042psirt@lenovo.com
Patch
Vendor Advisory
Hyperlink: https://support.lenovo.com/us/en/product_security/LEN-30042
Source: psirt@lenovo.com
Resource:
Patch
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

108Records found

CVE-2016-2393
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 10.70%
||
7 Day CHG~0.00%
Published-11 Apr, 2016 | 14:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Lenovo Fingerprint Manager before 8.01.57 and Touch Fingerprint before 1.00.08 use weak ACLs for unspecified (1) services and (2) files, which allows local users to gain privileges by invalidating local checks.

Action-Not Available
Vendor-n/aLenovo Group Limited
Product-fingerprint_managertouch_fingerprintn/a
CVE-2024-33578
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-7.8||HIGH
EPSS-0.04% / 10.68%
||
7 Day CHG~0.00%
Published-11 Oct, 2024 | 15:16
Updated-15 Oct, 2024 | 12:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A DLL hijack vulnerability was reported in Lenovo Leyun that could allow a local attacker to execute code with elevated privileges.

Action-Not Available
Vendor-Lenovo Group Limited
Product-Leyunleyun
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2024-33580
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-7.8||HIGH
EPSS-0.04% / 10.68%
||
7 Day CHG~0.00%
Published-11 Oct, 2024 | 15:17
Updated-15 Oct, 2024 | 12:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A DLL hijack vulnerability was reported in Lenovo Personal Cloud that could allow a local attacker to execute code with elevated privileges.

Action-Not Available
Vendor-Lenovo Group Limited
Product-Personal Cloudpersonal_cloud
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2024-33581
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-7.8||HIGH
EPSS-0.04% / 10.68%
||
7 Day CHG~0.00%
Published-11 Oct, 2024 | 15:17
Updated-15 Oct, 2024 | 12:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A DLL hijack vulnerability was reported in Lenovo PC Manager AI intelligent scenario that could allow a local attacker to execute code with elevated privileges.

Action-Not Available
Vendor-Lenovo Group Limited
Product-PC Manager AI intelligent scenariopcmanager
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2016-1876
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 10.70%
||
7 Day CHG~0.00%
Published-23 May, 2017 | 03:56
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The backend service process in Lenovo Solution Center (aka LSC) before 3.3.0002 allows local users to gain SYSTEM privileges via unspecified vectors.

Action-Not Available
Vendor-n/aLenovo Group Limited
Product-solution_centern/a
CVE-2020-8318
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-7.3||HIGH
EPSS-0.12% / 31.92%
||
7 Day CHG~0.00%
Published-14 Apr, 2020 | 21:05
Updated-16 Sep, 2024 | 22:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A privilege escalation vulnerability was reported in the LenovoSystemUpdatePlugin for Lenovo System Interface Foundation prior to version that could allow an authenticated user to execute code with elevated privileges.

Action-Not Available
Vendor-Lenovo Group Limited
Product-system_interface_foundationLenovoSystemUpdatePlugin for Lenovo System Interface Foundation
CVE-2020-8338
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-7.8||HIGH
EPSS-0.05% / 15.56%
||
7 Day CHG~0.00%
Published-14 Oct, 2020 | 21:25
Updated-04 Aug, 2024 | 09:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A DLL search path vulnerability was reported in Lenovo Diagnostics prior to version 4.35.4 that could allow a user with local access to execute code on the system.

Action-Not Available
Vendor-Lenovo Group Limited
Product-diagnosticsDiagnostics
CWE ID-CWE-426
Untrusted Search Path
CVE-2015-8535
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 21.27%
||
7 Day CHG~0.00%
Published-27 Mar, 2020 | 14:05
Updated-06 Aug, 2024 | 08:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

MITRE is populating this ID because it was assigned prior to Lenovo becoming a CNA. A directory traversal vulnerability was discovered (fixed and publicly disclosed in 2015) in Lenovo Solution Center (LSC) prior to version 3.3.002 that could allow a user to execute arbitrary code with elevated privileges.

Action-Not Available
Vendor-n/aLenovo Group Limited
Product-solution_centern/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2015-8534
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 10.01%
||
7 Day CHG~0.00%
Published-27 Mar, 2020 | 14:05
Updated-06 Aug, 2024 | 08:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

MITRE is populating this ID because it was assigned prior to Lenovo becoming a CNA. A local privilege escalation vulnerability was discovered (fixed and publicly disclosed in 2015) in Lenovo Solution Center (LSC) prior to version 3.3.002 that could allow a user to execute arbitrary code with elevated privileges.

Action-Not Available
Vendor-n/aLenovo Group Limited
Product-solution_centern/a
CWE ID-CWE-269
Improper Privilege Management
CVE-2015-8110
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.05% / 15.31%
||
7 Day CHG~0.00%
Published-24 Apr, 2017 | 06:12
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Lenovo System Update (formerly ThinkVantage System Update) before 5.07.0019 allows local users to gain privileges by navigating to (1) "Click here to learn more" or (2) "View privacy policy" within the Tvsukernel.exe GUI application in the context of a temporary administrator account, aka a "local privilege escalation vulnerability."

Action-Not Available
Vendor-n/aLenovo Group Limited
Product-lenovo_system_updaten/a
CVE-2015-7333
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 10.01%
||
7 Day CHG~0.00%
Published-27 Mar, 2020 | 14:05
Updated-06 Aug, 2024 | 07:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

MITRE is populating this ID because it was assigned prior to Lenovo becoming a CNA. A local privilege escalation vulnerability was reported (fixed and publicly disclosed in 2015) in Lenovo System Update version 5.07.0008 and prior where the SUService.exe /type INF and INF_BY_COMPATIBLE_ID command types could allow a user to execute arbitrary code with elevated privileges.

Action-Not Available
Vendor-n/aLenovo Group Limited
Product-system_updaten/a
CWE ID-CWE-269
Improper Privilege Management
CVE-2015-7818
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.05% / 13.41%
||
7 Day CHG~0.00%
Published-12 Nov, 2015 | 02:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The administration-panel web service in IBM System Networking Switch Center (SNSC) before 7.3.1.5 and Lenovo Switch Center before 8.1.2.0 allows local users to execute arbitrary JSP code with SYSTEM privileges by using the Apache Axis AdminService deployment method to install a .jsp file.

Action-Not Available
Vendor-n/aLenovo Group LimitedIBM Corporation
Product-switch_centersystem_networking_switch_centern/a
CVE-2015-7334
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 10.01%
||
7 Day CHG~0.00%
Published-27 Mar, 2020 | 14:05
Updated-06 Aug, 2024 | 07:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

MITRE is populating this ID because it was assigned prior to Lenovo becoming a CNA. A local privilege escalation vulnerability was reported (fixed and publicly disclosed in 2015) in Lenovo System Update version 5.07.0008 and prior where the SUService.exe /type COMMAND type could allow a user to execute arbitrary code with elevated privileges.

Action-Not Available
Vendor-n/aLenovo Group Limited
Product-system_updaten/a
CWE ID-CWE-269
Improper Privilege Management
CVE-2015-3321
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 8.80%
||
7 Day CHG~0.00%
Published-02 Oct, 2017 | 18:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Services and files in Lenovo Fingerprint Manager before 8.01.42 have incorrect ACLs, which allows local users to invalidate local checks and gain privileges via standard filesystem operations.

Action-Not Available
Vendor-n/aLenovo Group Limited
Product-fingerprint_managern/a
CVE-2015-2219
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-29.58% / 96.45%
||
7 Day CHG~0.00%
Published-12 May, 2015 | 19:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Lenovo System Update (formerly ThinkVantage System Update) before 5.06.0034 uses predictable security tokens, which allows local users to gain privileges by sending a valid token with a command to the System Update service (SUService.exe) through an unspecified named pipe.

Action-Not Available
Vendor-n/aLenovo Group Limited
Product-system_updaten/a
CVE-2025-6231
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-8.5||HIGH
EPSS-0.03% / 5.15%
||
7 Day CHG~0.00%
Published-17 Jul, 2025 | 19:19
Updated-22 Jul, 2025 | 17:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An improper validation vulnerability was reported in Lenovo Vantage that under certain conditions could allow a local attacker to execute code with elevated permissions by modifying an application configuration file.

Action-Not Available
Vendor-Lenovo Group Limited
Product-commercial_vantagevantageVantageCommercial Vantage
CWE ID-CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
CVE-2024-23594
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-6.4||MEDIUM
EPSS-0.03% / 7.80%
||
7 Day CHG~0.00%
Published-15 Apr, 2024 | 18:01
Updated-06 Sep, 2024 | 22:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A buffer overflow vulnerability was reported in a system recovery bootloader that was part of the Lenovo preloaded Windows 7 and 8 operating systems from 2012 to 2014 that could allow a privileged attacker with local access to execute arbitrary code.

Action-Not Available
Vendor-Lenovo Group Limited
Product-Windows 7 and 8 PC Preloadspreload_directory
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2025-2502
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-8.5||HIGH
EPSS-0.01% / 1.85%
||
7 Day CHG~0.00%
Published-30 May, 2025 | 19:14
Updated-03 Jun, 2025 | 03:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An improper default permissions vulnerability was reported in Lenovo PC Manager that could allow a local attacker to elevate privileges.

Action-Not Available
Vendor-Lenovo Group Limited
Product-PC Manager
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2025-2501
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-8.5||HIGH
EPSS-0.02% / 3.06%
||
7 Day CHG~0.00%
Published-30 May, 2025 | 19:14
Updated-03 Jun, 2025 | 03:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An untrusted search path vulnerability was reported in Lenovo PC Manager that could allow a local attacker to elevate privileges.

Action-Not Available
Vendor-Lenovo Group Limited
Product-PC Manager
CWE ID-CWE-426
Untrusted Search Path
CVE-2024-2175
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-7.8||HIGH
EPSS-0.03% / 5.26%
||
7 Day CHG~0.00%
Published-16 Aug, 2024 | 14:17
Updated-19 Aug, 2024 | 13:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An insecure permissions vulnerability was reported in Lenovo Display Control Center (LDCC) and Lenovo Accessories and Display Manager (LADM) that could allow a local attacker to escalate privileges.

Action-Not Available
Vendor-Lenovo Group Limited
Product-Accessories and Display ManagerDisplay Control Centerdisplay_control_centeraccessories_and_display_manager
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2018-16098
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-7.8||HIGH
EPSS-0.06% / 16.94%
||
7 Day CHG~0.00%
Published-24 Jan, 2019 | 22:00
Updated-16 Sep, 2024 | 16:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In some Lenovo ThinkPads, an unquoted search path vulnerability was found in various versions of the Synaptics Pointing Device driver which could allow unauthorized code execution as a low privilege user.

Action-Not Available
Vendor-Microsoft CorporationLenovo Group Limited
Product-thinkpad_t420sthinkpad_x1_carbon_firmwarethinkpad_t431sthinkpad_t580_firmwarewindows_8.1thinkpad_w541thinkpad_t530_firmwarethinkpad_x220_tablet_firmwarethinkpad_t570windows_10thinkpad_w541_firmwarethinkpad_w530thinkpad_x280_firmwarethinkpad_t460sthinkpad_t540thinkpad_t550thiankpad_x1_extremethinkpad_x240s_firmwarethinkpad_x1_firmwarethiankpad_p50s_firmwarethiankpad_l530_firmwarethiankpad_p52sthinkpad_w550sthiankpad_x1_extreme_firmwarethiankpad_p51thinkpad_x240sthiankpad_t420thiankpad_t420ithinkpad_t430s_firmwarethinkpad_x220ithinkpad_t470s_firmwarethiankpad_s1_yoga_firmwarethinkpad_x220i_firmwarethinkpad_t440thinkpad_t440_firmwarethiankpad_l530thinkpad_yoga_11ethinkpad_t520ithinkpad_x280thinkpad_t440sthinkpad_x230ithinkpad_t420sithinkpad_x230_tabletthinkpad_twistthiankpad_p70thinkpad_x230i_tabletthinkpad_s230u_firmwarethiankpad_p51sthinkpad_t520i_firmwaresynaptics_thinkpad_ultranav_driverthinkpad_x230thinkpad_x250thinkpad_t440p_firmwarethinkpad_t540pthinkpad_t540_firmwarethinkpad_t540p_firmwarethinkpad_t440s_firmwarethinkpad_t440pthinkpad_t560thinkpad_t530i_firmwarethinkpad_t460s_firmwarethiankpad_p1thinkpad_t470thiankpad_p1_firmwarethinkpad_t560_firmwarethinkpad_x230sthinkpad_t580thinkpad_x1_yoga_firmwarethinkpad_x240thinkpad_x1_yogathinkpad_x240_firmwarethinkpad_t430sthinkpad_x1_carbonthinkpad_x230i_firmwarethinkpad_t570_firmwarethiankpad_s1_yogathiankpad_p70_firmwarethinkpad_t420s_firmwarethinkpad_t520thinkpad_helix_firmwarethinkpad_t430ithinkpad_w530_firmwarethinkpad_x230_firmwarethinkpad_t430i_firmwarethiankpad_p50sthinkpad_x230i_tablet_firmwarethiankpad_p51_firmwarethiankpad_p51s_firmwarethinkpad_x230_tablet_firmwarethinkpad_t420si_firmwarethinkpad_x1thinkpad_t520_firmwarethinkpad_x1_hybridthiankpad_s430thiankpad_p52s_firmwarethinkpad_t550_firmwarethinkpad_w540_firmwarethinkpad_x220thinkpad_t470sthiankpad_t420_firmwarethiankpad_s430_firmwarethiankpad_l430thinkpad_helixthinkpad_w550s_firmwarethinkpad_w540thiankpad_l430_firmwarethinkpad_t530ithinkpad_x230s_firmwarethinkpad_x220_firmwarethinkpad_s230uthinkpad_t431s_firmwarethinkpad_x250_firmwarewindows_7thinkpad_x220_tabletthinkpad_t530thinkpad_x1_hybrid_firmwarethiankpad_t420i_firmwarethinkpad_t470_firmwarethinkpad_yoga_11e_firmwarethinkpad_twist_firmwareVarious ThinkPad products
CWE ID-CWE-428
Unquoted Search Path or Element
CVE-2015-6971
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.12% / 31.44%
||
7 Day CHG~0.00%
Published-02 Oct, 2017 | 18:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Lenovo System Update (formerly ThinkVantage System Update) before 5.07.0013 allows local users to submit commands to the System Update service (SUService.exe) and gain privileges by launching signed Lenovo executables.

Action-Not Available
Vendor-n/aLenovo Group Limited
Product-system_updaten/a
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CVE-2025-0886
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-8.5||HIGH
EPSS-0.01% / 1.32%
||
7 Day CHG~0.00%
Published-17 Jul, 2025 | 19:16
Updated-17 Jul, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An incorrect permissions vulnerability was reported in Elliptic Labs Virtual Lock Sensor that could allow a local, authenticated user to escalate privileges.

Action-Not Available
Vendor-Lenovo Group Limited
Product-Elliptic Human Presence Detection Device Driver for ThinkPad P14s Gen 4 (Type 21K5, 21K6)Elliptic Human Presence Detection Device Driver for ThinkPad P16s Gen 2 (Type 21K9, 21KA)lliptic Human Presence Detection Driver for P16s Gen 3 (Type 21KS, 21KT)Elliptic Virtual Lock Sensor Service for T14 Gen 4 (Type 21HD, 21HE)Elliptic Virtual Lock Sensor Service for ThinkPad X1 Carbon 12th Gen (Type 21KC, 21KD)Elliptic Virtual Lock Sensor Service for P16s Gen 2 (Type 21HK, 21HL)Elliptic Human Presence Detection Device Driver for ThinkPad P14s Gen 5 (Type 21ME, 21MF)lliptic Human Presence Detection Device Driver for T14 Gen 5 (Type 21MC, 21MD)Elliptic Human Presence detection Device Driver for ThinkPad P16 Gen 2 (Type 21FA, 21FB)Elliptic Human Presence Detection Driver for ThinkPad P14s Gen 5 (Type 21G2, 21G3)Elliptic Human Presence Detection Device Driver for T16 Gen 3 (Type 21MN, 21MQ)Elliptic Virtual Lock Sensor for ThinkPad X13 Gen 4 (Type 21EX, 21EY)Elliptic Human Presence Detection Driver for ThinkPad P16v Gen 1 (Type 21FE, 21FF)Elliptic Human Presence Detection Device Driver for ThinkPad P16v Gen 2 (Type 21KX, 21KY)Elliptic Virtual Lock Sensor Service For ThinkPad P1 Gen 6 (Type 21FV, 21FW)Elliptic Human Presence Detection Device Driver for T14 Gen 4 (Type 21K3, 21K4)Elliptic Virtual Lock Sensor for X13 Yoga Gen 4 (Type 21F2, 21F3)Elliptic Human Presence Detection driver for ThinkPad T14s Gen 6 (Type 21M1, 21M2)Elliptic Virtual Lock Sensor Service for P14s Gen 4 (Type 21HF, 21HG)Elliptic Human Presence Detection Device Driver for ThinkPad P16v Gen 1 (Type 21FC, 21FD)Elliptic Virtual Lock Sensor Service for ThinkPad T14 Gen 3 (Type 21CF, 21CG))Elliptic Virtual Lock Sensor Service for T14s Gen 4 (Type 21F6, 21F7)Elliptic Human Presence Detection Device Driver for T16 Gen 2 (Type 21K7 21K8)Elliptic Human Presence Detection Device Driver for T14 Gen 5 (Type 21ML, 21MM)Elliptic Human Presence Detection Driver for ThinkPad X13 Gen 4 (Type 21J3, 21J4)Elliptic Human Presence Detection Device Driver for X13 Gen 5 (Type 21LU, 21LV)Elliptic Human Presence Detection Device Driver for X13 2-in-1 Gen 5 (Type 21LW, 21LX)Elliptic Human Presence Detection Device Driver for T14s Gen 5 (Type 21LS, 21LT)Elliptic Human Presence Detection Driver for ThinkPad P1 Gen 7 (Type 21KV, 21KW)Elliptic Virtual Lock Sensor Service for X1 2-in-1 Gen 9 (Type 21KE, 21KF)Elliptic Virtual Lock Sensor Service for T16 Gen 2 (Type 21HH, 21HJ)Elliptic Virtual Lock Sensor Service for ThinkPad T14 Gen 3 (Type 21AH, 21AJ)Elliptic Human Presence Detection Device Driver for ThinkPad T14s Gen 4 (Type 21F8, 21F9)
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2024-12673
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-8.5||HIGH
EPSS-0.02% / 3.66%
||
7 Day CHG~0.00%
Published-12 Feb, 2025 | 20:31
Updated-12 Feb, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An improper privilege vulnerability was reported in a BIOS customization feature of Lenovo Vantage on SMB notebook devices which could allow a local attacker to elevate privileges on the system. This vulnerability only affects Vantage installed on these devices: * Lenovo V Series (Gen 5) * ThinkBook 14 (Gen 6, 7) * ThinkBook 16 (Gen 6, 7) * ThinkPad E Series (Gen 1)

Action-Not Available
Vendor-Lenovo Group Limited
Product-Vantage
CWE ID-CWE-250
Execution with Unnecessary Privileges
CVE-2023-6338
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-7.8||HIGH
EPSS-0.05% / 15.36%
||
7 Day CHG~0.00%
Published-03 Jan, 2024 | 21:00
Updated-03 Jun, 2025 | 14:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Uncontrolled search path vulnerabilities were reported in the Lenovo Universal Device Client (UDC) that could allow an attacker with local access to execute code with elevated privileges.

Action-Not Available
Vendor-Lenovo Group Limited
Product-universal_device_clientUniversal Device Client (UDC)
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2023-6043
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-7.8||HIGH
EPSS-0.01% / 0.28%
||
7 Day CHG~0.00%
Published-19 Jan, 2024 | 20:08
Updated-17 Jun, 2025 | 21:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A privilege escalation vulnerability was reported in Lenovo Vantage that could allow a local attacker to bypass integrity checks and execute arbitrary code with elevated privileges.

Action-Not Available
Vendor-Lenovo Group Limited
Product-vantageVantage
CWE ID-CWE-295
Improper Certificate Validation
CVE-2008-4589
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.09% / 27.27%
||
7 Day CHG~0.00%
Published-15 Oct, 2008 | 22:00
Updated-07 Aug, 2024 | 10:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Heap-based buffer overflow in the tvtumin.sys kernel driver in Lenovo Rescue and Recovery 4.20, including 4.20.0511 and 4.20.0512, allows local users to execute arbitrary code via a long file name.

Action-Not Available
Vendor-n/aLenovo Group Limited
Product-resuce_and_recoveryn/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2023-5080
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-6.8||MEDIUM
EPSS-0.04% / 10.81%
||
7 Day CHG~0.00%
Published-19 Jan, 2024 | 20:06
Updated-17 Jun, 2025 | 21:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A privilege escalation vulnerability was reported in some Lenovo tablet products that could allow local applications access to device identifiers and system commands.

Action-Not Available
Vendor-Lenovo Group Limited
Product-tab_m8_hd_tb8505x_firmwaretab_m8_hd_tb8505fstab_p11_pro_gen_2_tb132fu_firmwaretab_m10_plus_gen_3_tb125futab_m8_hd_tb8505fs_firmwaretab_m8_hd_tb8505ftab_m8_hd_tb8505xstab_m8_hd_tb8505xs_firmwaretab_p11_pro_gen_2_tb132futab_m8_hd_tb8505xtab_m8_hd_tb8505f_firmwaretab_m10_plus_gen_3_tb125fu_firmwareTablet
CWE ID-CWE-266
Incorrect Privilege Assignment
CVE-2023-4706
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-7.3||HIGH
EPSS-0.07% / 22.47%
||
7 Day CHG~0.00%
Published-08 Nov, 2023 | 21:59
Updated-02 Aug, 2024 | 07:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A privilege escalation vulnerability was reported in Lenovo preloaded devices deployed using Microsoft AutoPilot under a standard user account due to incorrect default privileges.

Action-Not Available
Vendor-Lenovo Group Limited
Product-preload_directory1Lenovo Preload Directory
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2023-4632
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-7.8||HIGH
EPSS-0.07% / 21.83%
||
7 Day CHG~0.00%
Published-08 Nov, 2023 | 21:58
Updated-03 Sep, 2024 | 20:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An uncontrolled search path vulnerability was reported in Lenovo System Update that could allow an attacker with local access to execute code with elevated privileges.

Action-Not Available
Vendor-Lenovo Group Limited
Product-system_updateLenovo System Update
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2023-4030
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-8.4||HIGH
EPSS-0.07% / 22.52%
||
7 Day CHG~0.00%
Published-17 Aug, 2023 | 16:48
Updated-08 Oct, 2024 | 13:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability was reported in BIOS for ThinkPad P14s Gen 2, P15s Gen 2, T14 Gen 2, and T15 Gen 2 that could cause the system to recover to insecure settings if the BIOS becomes corrupt.

Action-Not Available
Vendor-Lenovo Group Limited
Product-thinkpad_t14_gen_2thinkpad_p14s_gen_2thinkpad_p15s_gen_2thinkpad_t15_gen_2_firmwarethinkpad_p14s_gen_2_firmwarethinkpad_t15_gen_2thinkpad_p15s_gen_2_firmwarethinkpad_t14_gen_2_firmwareThinkPadthinkpad
CWE ID-CWE-636
Not Failing Securely ('Failing Open')
CVE-2022-1892
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 9.65%
||
7 Day CHG~0.00%
Published-23 Jan, 2023 | 15:31
Updated-02 Apr, 2025 | 14:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A buffer overflow in the SystemBootManagerDxe driver in some Lenovo Notebook products may allow an attacker with local privileges to execute arbitrary code.

Action-Not Available
Vendor-Lenovo Group Limited
Product-yoga_s730-13imlideapad_3-17ada05_firmwareideapad_s940-14iilthinkbook_14p_g2_ach500w_gen_3ideapad_3-14ada05s145-15api_firmwareideapad_5_15aba7v14_g2-alcyoga_c640-13iml_firmwareideapad_slim_1-11ast-05_firmwareyoga_c940-15irh_firmwarev14_g2-alc_firmwareideapad_5_15aba7_firmware100w_gen_3_firmwareideapad_flex_5_16alc7_firmware14w_gen_2v130-15ikbflex_5-15iil05s145-14ast_firmware300e_2nd_gen_firmwareyoga_s730-13iml_firmwarev14-ada_firmwareideapad_1-14ada05yoga_c940-15irhthinkbook_13s_g2_are_firmwarethinkbook_14s-iml_firmware13w_yoga_firmwareideapad_1-14igl05thinkbook_16p_g2_achflex_5-15iil05_firmwareyoga_c640-13iml_lte_firmwareflex_5-15itl05_firmwareideapad_3-17alc6legion_s7-15arh5s540-13api_firmwarev130-15ikb_firmwares145-15ast_firmwarethinkbook_14-iil_firmwareideapad_3-15alc6ideapad_3-15ada05ideapad_slim_1-14ast-05_firmwareflex_5-15alc05ideapad_3-15ada6100e_2nd_genthinkbook_14s_g2_itl300w_gen_3ideapad_3-17ada6_firmware100e_2nd_gen_firmwareideapad_5-15alc05ideapad_3-17ada05flex_5-14are05s145-15astthinkbook_14-iil300e_2nd_genflex_5-14alc05yoga_c640-13iml_ltelegion_s7-15ach6_firmware730s-13iml_firmwareyoga_slim_7_pro-14ach5_firmwarethinkbook_13s_g3_acn_firmwareyoga_slim_7_pro-14ach5_ov15_g2-alc_firmwarelegion_s7-15arh5_firmwares145-15apiyoga_s940-14iilideapad_slim_1-14ast-05yoga_slim_7_pro-14ach5ideapad_3-14alc6_firmwarethinkbook_14s-imllegion_s7-15imh5thinkbook_14-iml_firmwarethinkbook_15-iml_firmware300w_gen_3_firmwarelegion_s7-15imh5_firmwarethinkbook_13s_g2_itllegion_s7-15ach6500w_gen_3_firmwarethinkbook_13s_g2_areideapad_3-14ada6ideapad_3-15ada6_firmware730s-13imlthinkbook_15-iil_firmwareideapad_3-17ada6ideapad_slim_1-11ast-05v15-ada_firmwareideapad_1-14igl05_firmwarethinkbook_16p_g2_ach_firmwareyoga_slim_7_pro-14arh5ideapad_1-11ada05_firmwarethinkbook_13s-iml_firmwareflex_5-15itl05thinkbook_13s-imlv15-adaideapad_flex_5_16alc714w_gen_2_firmwareideapad_flex_5_14alc7ideapad_1-11ada05ideapad_5-15alc05_firmwareflex_5-14iil05yoga_s940-14iil_firmwares145-14api_firmwarethinkbook_15-imlyoga_slim_7_pro-14ach5_o_firmwareyoga_slim_7_pro-14arh5_firmware100w_gen_3ideapad_3-14alc6thinkbook_14s_g2_itl_firmwarethinkbook_15-iilv15_g2-alcflex_3-11ada05s145-14astthinkbook_13s_g3_acnflex_5-14alc05_firmwareflex_3-11ada05_firmwarethinkbook_14p_g2_ach_firmwareideapad_1-14ada05_firmwareideapad_3-14ada05_firmwareflex_5-15alc05_firmwareflex_5-14itl05_firmwarev14-adaideapad_3-15alc6_firmwareideapad_3-14ada6_firmwareflex_5-14iil05_firmwareideapad_1-11igl05ideapad_3-15ada05_firmwareideapad_3-17alc6_firmwarethinkbook_13s_g2_itl_firmwareyoga_9-15imh5flex_5-14itl05ideapad_1-11igl05_firmwares540-13apiideapad_flex_5_14alc7_firmwarethinkbook_14-imlideapad_s940-14iil_firmwareflex_5-14are05_firmwareyoga_9-15imh5_firmwares145-14api13w_yogayoga_c640-13imlBIOS
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2022-1891
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 9.65%
||
7 Day CHG~0.00%
Published-23 Jan, 2023 | 15:25
Updated-03 Apr, 2025 | 16:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A buffer overflow in the SystemLoadDefaultDxe driver in some Lenovo Notebook products may allow an attacker with local privileges to execute arbitrary code.

Action-Not Available
Vendor-Lenovo Group Limited
Product-thinkbook_15-imlthinkbook_14-iml_firmwareyoga_c640-13iml_firmwarethinkbook_15-iml_firmwarethinkbook_14-iil_firmwarethinkbook_14-imlthinkbook_15-iilyoga_c640-13imlyoga_c640-13iml_lte_firmwarethinkbook_14-iilthinkbook_15-iil_firmwareyoga_c640-13iml_lteBIOS
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2022-0354
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-7.3||HIGH
EPSS-0.05% / 15.69%
||
7 Day CHG~0.00%
Published-22 Apr, 2022 | 20:30
Updated-02 Aug, 2024 | 23:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability was reported in Lenovo System Update that could allow a local user with interactive system access the ability to execute code with elevated privileges only during the installation of a System Update package released before 2022-02-25 that displays a command prompt window.

Action-Not Available
Vendor-Lenovo Group Limited
Product-system_updateSystem Update
CVE-2022-1107
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 7.52%
||
7 Day CHG~0.00%
Published-22 Apr, 2022 | 20:30
Updated-02 Aug, 2024 | 23:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

During an internal product security audit a potential vulnerability due to use of Boot Services in the SmmOEMInt15 SMI handler was discovered in some ThinkPad models could be exploited by an attacker with elevated privileges that could allow for execution of code.

Action-Not Available
Vendor-Lenovo Group Limited
Product-thinkpad_t580_firmwarethinkpad_11e_yoga_firmwarethinkpad_x1_yoga_gen_2thinkpad_t560thinkpad_w541thinkpad_yoga_15thinkpad_x1_carbon_3rd_gen_firmwarethinkpad_x1_carbon_4th_genthinkpad_x1_yoga_gen_2_firmwarethinkpad_t570thinkpad_l560thinkpad_p50sthinkpad_t560_firmwarethinkpad_w541_firmwarethinkpad_t580thinkpad_x1_yoga_firmwarethinkpad_x1_carbon_5th_gen_skylake_firmwarethinkpad_p51sthinkpad_x280_firmwarethinkpad_t550thinkpad_x1_yogathinkpad_x1_carbon_3rd_genthinkpad_11e_yogathinkpad_x1_tablet_gen_2_firmwarethinkpad_helix_firmwarethinkpad_t570_firmwarethinkpad_11e_firmwarethinkpad_x1_carbon_5th_gen_kabylake_firmwarethinkpad_yoga_260thinkpad_l570thinkpad_p52s_firmwarethinkpad_x1_tablet_gen_1_firmwarethinkpad_w550sthinkpad_x1_carbon_5th_gen_kabylakethinkpad_x1_carbon_5th_gen_skylakethinkpad_x1_yoga_gen_3_firmwarethinkpad_x1_carbon_4th_gen_firmwarethinkpad_t550_firmwarethinkpad_l570_firmwarethinkpad_w540_firmwarethinkpad_x390_firmwarethinkpad_yoga_15_firmwarethinkpad_11ethinkpad_yoga_260_firmwarethinkpad_helixthinkpad_x1_tablet_gen_1thinkpad_x1_tablet_gen_2thinkpad_w550s_firmwarethinkpad_l560_firmwarethinkpad_w540thinkpad_x280thinkpad_x250thinkpad_x390thinkpad_p50s_firmwarethinkpad_s540thinkpad_s540_firmwarethinkpad_x250_firmwarethinkpad_x1_yoga_gen_3thinkpad_p51s_firmwarethinkpad_p52sThinkPad BIOS
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-269
Improper Privilege Management
CVE-2022-1108
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-6.7||MEDIUM
EPSS-0.08% / 25.38%
||
7 Day CHG~0.00%
Published-22 Apr, 2022 | 20:30
Updated-02 Aug, 2024 | 23:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A potential vulnerability due to improper buffer validation in the SMI handler LenovoFlashDeviceInterface in Thinkpad X1 Fold Gen 1 could be exploited by an attacker with local access and elevated privileges to execute arbitrary code.

Action-Not Available
Vendor-Lenovo Group Limited
Product-thinkpad_x1_fold_gen_1thinkpad_x1_fold_gen_1_firmwareThinkPad BIOS
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-269
Improper Privilege Management
CVE-2023-3078
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-7.8||HIGH
EPSS-0.04% / 10.23%
||
7 Day CHG~0.00%
Published-17 Aug, 2023 | 16:47
Updated-08 Oct, 2024 | 16:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An uncontrolled search path vulnerability was reported in the Lenovo Universal Device Client (UDC) that could allow an attacker with local access to execute code with elevated privileges.

Action-Not Available
Vendor-Lenovo Group Limited
Product-universal_device_clientUniversal Device Client (UDC)
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2023-3112
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-7.8||HIGH
EPSS-0.06% / 18.59%
||
7 Day CHG~0.00%
Published-24 Oct, 2023 | 20:31
Updated-12 Sep, 2024 | 14:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability was reported in Elliptic Labs Virtual Lock Sensor for ThinkPad T14 Gen 3 that could allow an attacker with local access to execute code with elevated privileges.

Action-Not Available
Vendor-ellipticlabsLenovo Group Limited
Product-virtual_lock_sensorai_virtual_presence_sensorthinkpad_t14_gen_3AI Virtual Presence SensorElliptic Labs Virtual Lock Sensorthinkpad_t14_gen_3
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2024-9046
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.94%
||
7 Day CHG~0.00%
Published-11 Oct, 2024 | 15:16
Updated-17 Oct, 2024 | 19:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A DLL hijack vulnerability was reported in Lenovo stARstudio that could allow a local attacker to execute code with elevated privileges.

Action-Not Available
Vendor-Lenovo Group Limited
Product-starstudiostARstudiostarstudio
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2024-8105
Matching Score-8
Assigner-CERT/CC
ShareView Details
Matching Score-8
Assigner-CERT/CC
CVSS Score-6.4||MEDIUM
EPSS-0.02% / 4.40%
||
7 Day CHG~0.00%
Published-26 Aug, 2024 | 19:15
Updated-25 Aug, 2025 | 21:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Insecure Platform Key (PK) used in UEFI system firmware signature

A vulnerability related to the use an insecure Platform Key (PK) has been discovered. An attacker with the compromised PK private key can create malicious UEFI software that is signed with a trusted key that has been compromised.

Action-Not Available
Vendor-FormelifeAopenSupermicroGigabyteIntel CorporationHP Inc.Lenovo Group LimitedDell Inc.Fujitsu LimitedAcer Inc.
Product-G493-ZB4 (rev. AAP1)GA-B150M-Gaming (rev. 1.0)GA-Z68XP-UD4 (rev. 1.0)GB-BXi5-4200 (rev. 1.0)MSH61DI (rev. 1.2)G593-ZD1 (rev. AAX1)MZ72-HB2 (rev. 3.0)G262-ZR0X299 DESIGNARE EX (rev. 1.0)R123-X00 (rev. AA01)hp-prodesk-400-g1-microtower-pcGA-H110M-AE283-Z91 (rev. AAV1)GA-Z170X-Ultra Gaming (rev. 1.0)G1.Sniper Z170 (rev. 1.0)R282-Z96 (rev. 100)Q1742FT181-G20 (rev. 1.0)G190-H44MZ73-LM0 (rev. 2.0)G481-H80 (rev. 100)GB-BXi5G3-760 (rev. 1.0)GB-GZ1DTi7-1070-NK (rev. 1.0)G241-G40 (rev. 100)MA10-ST0 (rev. 1.1)R281-3C1GB-BKi5HT2-7200 (rev. 1.0)GA-J1800N-HGA-H61M-S2PV (rev. 2.3)MZ73-LM1 (rev. 1.x)GA-H170-Gaming 3 DDR3 (rev. 1.0)GB-BNi7QG4-950 (rev. 1.0)alienware-x14-r1-laptopGB-BSCE-3955GA-Z170X-Gaming G1 (rev. 1.0)MZ72-HB2 (rev. 3.x)inspiron-15-3502-laptopxps-8960-desktopinspiron-20-3059-aioalienware-m17-r4-laptopGB-BNE3HG4-950 (rev. 1.0)MZBAYAG (rev. 1.0)W281-G40X299 AORUS Gaming 3 ProGB-BKi7HT-7500GB-EKi3A-7100GA-P67A-UD3-B3 (rev. 1.x)R283-Z93thinkcentre-m62zGB-BSi3A-6100 (rev. 1.0)R271-Z00 (rev. B00)R283-ZF0 (rev. AAL1)inspiron-15-3510-laptopG1.Sniper 3 (rev. 1.0)H262-PC0 (rev. 100)G1.Sniper M7 (rev. 1.0)MU92-TU0 (rev. 1.x)GA-H170-HD3 DDR3GB-TCV2A (rev. 1.0)GA-B75TNG150-B10 (rev. 111)alienware-m17-r3-laptopGA-Z68X-UD3P-B3MD72-HB3 (rev. 1.x)GA-Z170N-WIFIMZ72-HB0 (rev. 3.x/4.x)H261-T60 (rev. 100)R283-Z93 (rev. AAF1)G292-Z46PRIMERGY CX270 S2X299 AORUS MASTERvostro-24-5460-aioGA-C1007UN (rev. 1.0)alienware-m15-r2-laptopE283-S90 (rev. AAD1)GB-BNi5HG6-1060GA-B150M-DS3PMultipleG292-Z20 (rev. 100)GB-BRi5-10210(E)GA-H110M-S2H DDR3GA-H110M-DS2V (rev. 1.0)GB-BACE-3000-FT-BW (rev. 1.0)GA-Z68XP-D3 (rev. 1.0)GB-BRi5-8250GA-Z68MA-D2H-B3 (rev. 1.0)R181-Z90poweredge-c5230G482-Z53MW32-SP0 (rev. 1.0)R263-Z35 (rev. AAL1)alienware-area51m-r2-laptopthinkcentre-edge-92zGA-Z68MX-UD2H-B3P15F R5X299-WU8inspiron-24-3455-aioM9M3XAI (rev. 1.0)aspire c22-1600G291-Z20 (rev. A00)c24-1655GA-X99-UD7 WIFIGA-Z170-HD3PG593-ZD2 (rev. AAX1)MW22-SE0 (rev. 1.0)GA-H110M-S2PTGA-X99-SOC ChampionGA-H110M-S2 (rev. 1.x)GB-BSI3H-6100-ZA-IWUS (rev. 1.0)GB-BRi3-10110 (rev. 1.0)hp-rp5-retail-system-model-5810MB10-DS0 (rev. 1.3)GB-BXi5G-760 (rev. 1.0)X299 UD4 Pro (rev. 1.0)R133-C10 (rev. AAG1)MD61-SC2 (rev. 1.x)GB-BXi5-4570RG293-S46 (rev. AAM1)GB-BKi5A-7200 (rev. 1.0)GA-X99-SLIMD70-HB1 (rev. 1.2)S12-P04R (rev. 1.0)MC13-LE0 (rev. 1.x/3.x)G482-Z50 (rev. 100)GA-H170M-D3H DDR3GA-H87TN (rev. 1.0)MZBAYAD (rev. 1.0)GA-B85TNX299 AORUS GamingR283-S94H231-G20 (rev. 100/A00)MX34-BS0 (rev. 1.x)GB-BEi5-1240 (rev. 1.0)MW70-3S0 (rev. 1.0)GB-EKi3M-7100iTXL-Q170AMF51-ES0 (rev. 1.0)GA-Z68XP-UD3P (rev. 1.0)inspiron-3472-desktopG492-Z52aspire xc-1710R162-ZA0 (rev. 100)GA-P75-D3 (rev. 1.0)R283-Z97H262-NO1hp-elitedesk-705-g1-desktop-mini-pcGA-H170TNR121-X30 (rev. 100)G593-ZX1 (rev. AAX1)MP30-AR1 (rev. 1.1)aio-300-22isuGA-J1900N-D2Hinspiron-22-3263-desktop-aioGA-H170M-DS3HGA-H61M-SGA-E350N WIN8 (rev. 1.0)GB-BXi5-5200G492-Z50 (rev. A00)MD30-RS0 (rev. 1.0)H262-Z61GA-6LXGH (rev. 1.0)hp-z1-all-in-one-g2-workstationR282-G30GB-BER5-5600GA-Z170X-Gaming GTGB-XM12-3227 (rev. 1.0)GA-Z77X-UD4Haspire s32-1856GA-Z68X-UD3-B3GA-H110-D3A (rev. 1.0)G292-Z43GB-EACE-3450X299 AORUS Gaming 3GA-H81TNH262-Z6BH270-H70 (rev. 100)G1.Sniper B7GA-Z170X-Gaming 3 (rev. 1.0)GA-Z170X-UD3 (rev. 1.0)GA-6LXSG (rev. 1.0)GA-H110M-S2VR260-R3CGA-J1900M-D2P (rev. 1.1)GB-BSi3-6100 (rev. 1.0)GB-GZ1DTi5K (rev. 1.0)GB-BRi3-8130MZBAYAC (rev. 1.0)R143-EG0-AAC1MDH11HI (rev. 1.0)GA-X99-Gaming 5PGA-Z77M-D3H-MVP (rev. 1.0)GA-Z170-Gaming K3 (rev. 1.0)GB-BER3-5300G242-Z10MZ73-LM1 (rev. 1.0)R162-ZA0 (rev. A00)GB-BXi7-4500 (rev. 1.0)R163-SG0 (rev. AAC1)MD80-TM1 (rev. 1.0)lenovo-c365-all-in-oneGB-BSi7-6500GB-BSi5A-6200GB-BER5-5500 (rev. 1.0)MZ32-AR0 (rev. 3.x)GB-BPCE-3455CS252-ZC0G492-ZD0 (rev. 100)R181-2A0 (rev. 100)GB-BER3-5400alienware-aurora-r16-desktopPRIMERGY RX100 S7pGB-BACE-3150-FT-BW (rev. 1.0)R183-Z90 (rev. LAD1)MD72-HB0 (rev. 1.x/2.0)GA-H110MSTX-HD3 (rev. 1.0)GA-B150M-D3H (rev. 1.0)WRX80-SU8-IPMI (rev. 1.0)G293-Z40GB-BSi7A-6500 (rev. 1.0)GB-BMCE-5105GA-Z170-HD3 (rev. 1.0)H233-Z80GA-J1800M-D2PGA-Z77M-D3HGB-BSi7-1165G7GA-H110M-HD3 DDR3GB-BXBT-1900GA-6LXGL (rev. 1.0)hp-z1-all-in-one-workstationGB-BNi7G4-1050TiGA-H170-HD3GA-H77TNU21MGA-6LXSL (rev. 1.0)GA-Z68X-UD3H-B3G152-Z12 (rev. 200)R143-E30 (rev. AAB1)R162-Z10GA-H110M-D3H R2 (rev. 1.0)aspire s 27GA-X99M-Gaming 5 (rev. 1.0)GA-Z170M-D3H (rev. 1.0)GA-X99-Phoenix SLIR280-G2OGA-H170M-D3HR160-S34R161-R12G292-Z20 (rev. A00)R263-Z35 (rev. AAF1)ME03-PE0 (rev. 1.0)H223-V10GB-EAPD-4200GA-Z77-DS3H (rev. 1.0)R182-Z90 (rev. A00/B00/AT0)GA-Z77-HD4alienware-17-laptopalienware-13-laptopG242-Z12GA-Z170X-UD5H252-Z12 (rev. A02)H262-PC1 (rev. 100)Q2542NE152-ZE1 (rev. A00)GA-Q77M-D2H (rev. 1.0)MZ71-CE0 (rev. 3.x/4.x)GA-Z170-D3HGA-Z77X-D3HGA-X99-Gaming 5 (rev. 1.0)alienware-17-r3H242-Z10 (rev. A00)GB-BRR5-4500 (rev. 1.0)J4105N HGB-BRR3-4300 (rev. 1.0)GB-BSi7HT-6500E163-Z30GB-BEi3-1220 (rev. 1.0)GB-BMCE-4500CG482-Z51 (rev. 100)GB-BER7-7840C621-SD8MC13-LE0 (rev. 1.x)hp-compaq-elite-8380-convertible-minitower-pcGA-B150M-D3H DDR3GA-Z77-HD3G493-ZB0 (rev. AAP1)R180-F28 (rev. 152)alienware-17-r2GB-BSi5-6200 (rev. 1.0)GA-Z77X-UD3H (rev. 1.0)GB-BRi7-8550 (rev. 1.0)GA-H170-D3HP (rev. 1.0)E163-S30 (rev. AAB1)G291-Z20 (rev. 100)E283-Z90GA-Z170X-UD5 TH (rev. 1.0)GA-P67X-UD3R-B3 (rev. 1.0)inspiron-3662-desktopaio-510-22asrGB-BXBT-2807GA-N3160N-D2HGA-H110M-DS2V DDR3 (rev. 1.0)alienware-aurora-r11-desktopMZ33-AR0 (rev. 1.x)MDH11KI (rev. 1.0)X299 UD4 (rev. 1.0)GA-H110M-S2PH DDR3MD71-HB0 (rev. 1.x)W771-Z00 (rev. 100)R133-X11 (rev. AAG1)lenovo-c460-all-in-oneGA-J1900N-D3V (rev. 1.x)MD60-SC0 (rev. 1.1)GA-H110M-HGB-BRi7-10710 (rev. 1.0)GA-X99-Gaming 7 WIFI (rev. 1.0)GA-B150N-GSMR262-ZA2GA-B150M-HD3 DDR3GB-BER7-5700GA-H170-Designare (rev. 1.0)GA-H110M-DS2 DDR3 (rev. 1.0)GA-N3150M-D3PGB-BXi7-4770R (rev. 1.0)MX32-4L0 (rev. 1.0)MB12-CE0 (rev. 100)GB-BACE-3150GA-H110M-Gaming 3 (rev. 1.0)GB-BSRE-1505 (rev. 1.0)GA-H77-DS3H (rev. 1.0)MD60-SC1 (rev. 1.1)GB-BSi3-1115G4 (rev. 1.0)GB-BKi7A-7500H230-R4C (rev. 100)GA-IMB1900NMZBSWAI (rev. 1.0)GA-P75-D3PR163-Z32 (rev. AAG1)G211-H4GMW31-SP0 (rev. 1.0)G250-G51 (rev. 400)alienware-aurora-r15-amd-desktopT181-Z70 (rev. A00)MFH27AI (rev. 1.0)MW34-SP0 (rev. 1.0)inspiron-3250-small-desktopG493-SB0G292-280 (rev. 100)R282-Z90 (rev. A00)GA-X99-Ultra GamingGA-Z170X-Gaming 6G262-IR0 (rev. 100)alienware-aurora-r13-desktopR121-340GA-H110NGA-B150M-D2V DDR3 (rev. 1.0)GB-BKi3A-7100 (rev. 1.0)R181-T90 (rev. 100)MF51-ES1 (rev. 1.0)R181-Z90 (rev. 100)R270-D70MZ71-CE0 (rev. 1.x)GA-X150M-PRO ECC (rev. 1.0)GA-H77N-WIFIG262-ZO0MZ33-CP0 (rev. 1.x)GA-H110M-S2HGA-H110M-D3H (rev. 1.0)GA-N3160TN (rev. 1.0)lenovo-erazer-x700-desktopGA-X150-PLUS WS (rev. 1.0)G493-ZB1 (rev. AAP1)R263-Z30 (rev. AAC1)hp-proone-400-g1-19.5-inch-non-touch-all-in-one-pcGB-BACE-3160GA-B150M-D2VGA-X99-UD4X299 AORUS Gaming 9 (rev. 1.0)MD72-HB2 (rev. 1.x)inspiron-17-5755-laptopalienware-13alienware-x17-r2-laptopMD72-HB1 (rev. 1.x)G492-H80MZ72-HB0 (rev. 3.0/4.0)GA-H110TN-MGA-B75N (rev. 1.0)GA-H110M-S2V DDR3 (rev. 1.0)MU72-SU0 (rev. 1.x/2.x)G180-G00 (rev. 100)D120-C20 (rev. 230)X299 AORUS Gaming 7 Pro (rev. 1.0)H253-Z10MB51-PS0 (rev. 1.0)H282-ZC0 (rev. A00)GB-BPCE-3455GA-X99-UD3P (rev. 1.0)H263-V11GA-H77M-HD3GA-N3050M-D3P (rev. 1.0)PRIMERGY TX100 S3pGA-Z170-HD3 DDR3 (rev. 1.0)GA-C1007UN-D (rev. 1.0)Studio Sys UPDlenovo-10w-type-82st-82suthinkcentre-edge-62zGA-Z170X-UD3 Ultra (rev. 1.0)GA-6LASL (rev. 1.0)S453-Z30R271-Z00 (rev. A00)TO25-Z11MZJ19AI (rev. 1.0)H23N-R4OGA-H110-D3EL-30 (rev. 1.0)GA-B75M-D3V (rev. 1.0)GB-BKi5HT-7200 (rev. 1.0)GA-X170-EXTREME ECCGA-H77-D3Hhp-compaq-pro-6305-microtower-pcG293-Z23MDH11BM (rev. 1.0)inspiron-24-3464-aioR143-EG0 (rev. AAC1)GA-X99-UD3GB-BEi7-1260 (rev. 1.0)MZ73-LM0 (rev. 2.x)H281-PE0MSQ77DI (rev. 1.1)C621-WD12-IPMI (rev. 1.0)GB-BPCE-3350C (rev. 1.0)GA-N3050N-D3H (rev. 1.0)H310NGA-N3150N-D3V (rev. 1.0)GA-Z68X-UD3R-B3GB-SIOPS-J1900 (rev. 1.0)GA-H110M-S2PV DDR3alienware-13-r2MATMH81 (rev. 1.0)GB-BSCEA-3955inspiron-5680-gaming-desktoplenovo-h520e-desktopG492-ID0 (rev. 100)J4005N D2PGA-X99-SOC ForceGB-BPCE-3350 (rev. 1.0)lenovo-62-desktopX299 AORUS Ultra Gaming Pro (rev. 1.0)GB-BACE-3000hp-z820-workstationGA-F2A85XM-D3HR182-34AG152-Z12R282-Z97 (rev. A00)GB-BSi7A-6600 (rev. 1.0)GB-BMPD-6005R163-Z30 (rev. AAB1)GA-B150M-D3VGA-H310TN-R2 (rev. 1.0)GA-H110M-S2PVMW21-SE0 (rev. 1.0)GA-Q87TN (rev. 1.0)E251-U70 (rev. 100)GB-BKi7HT2-7500 (rev. 1.0)GA-Z77X-UP5 TH (rev. 1.0)MQHUDVI (rev. 1.0)vostro-3252-small-desktopR263-Z33 (rev. AAL1)TO23-H60R182-NC0GA-H110M-DS2 (rev. 1.0/1.1/1.2)E162-220GA-B150-HD3 DDR3GA-Z77N-WIFIMC62-G41 (rev. 1.0)GA-B150M-HD3G291-280GA-H110TN-EGA-Z77P-D3PRIMERGY TX120 S3pC621-SU8 (rev. 1.0)GA-X150-PRO ECCGA-Z170X-Gaming 5 (rev. 1.0)GA-H110M-HD2 (rev. 1.0)R243-E30-AAC1X299 AORUS Ultra Gaming (rev. 1.0)MZAPLAI (rev. 1.0)GA-X99-Designare EXMU70-SU0 (rev. 1.0)GA-N3150N-D2H (rev. 1.0)alienware-15-r4GA-P67X-UD3-B3R152-Z30GA-N3160M-D3PE152-ZE0GA-B75M-HD3 (rev. 1.0)H263-V60 (rev. AAW1)H263-S62H261-Z60 (rev. 100)hp-elitedesk-800-g1-tower-pcxps-8950-desktopGA-H110M-DS2 (rev. 1.3)GB-BXi3-5010 (rev. 1.0)G191-H44GA-J1800N-D2PH (rev. 1.1)alienware-x15-r1-laptopGA-P110-D3iKBLMUx-DER(Volta Charging)GA-X99M-Gaming 5 (rev. 1.1)GA-7PXSL1 (rev. 1.0)H273-Z80H231-H60 (rev. 100/A00)R183-Z93 (rev. AAV1)GB-BSi5HT-6200 (rev. 1.0)G492-ZD2 (rev. A00)iAPLx-DE(TAA30 TEST)hp-z220-convertible-minitower-workstationGA-6UASL1 (rev. 1.0)GB-BXBT-3825 (rev. 1.0)GA-H110M-D3H R2 TPM (rev. 1.0)GA-Z68A-D3-B3 (rev. 1.0)MZBAYAI (rev. 1.0)GA-J1900M-D3PGA-H110M-S2HP (rev. 1.0)GB-SIOPS-4550U (rev. 1.0)hp-prodesk-600-g1-desktop-mini-pcGB-BSi5-1135G7G292-Z42 (rev. 100)W131-X30GA-Z77X-UD3Hinspiron-15-5552-laptopMJ11-EC0 (rev. 1.2)altos r680 f4GA-Z77MX-D3HC621-WD12H261-Z60GB-BNi5HG4-950GB-BSi5H-6200-B2-IW (rev. 1.0)GA-H61M-S1MZ33-AR0 (rev. 1.0)R282-Z93 (rev. A00)GA-J1800M-D2P-IN (rev. 1.1)MSH87FI (rev. 1.0)GA-B150N Phoenix (rev. 1.0)thinkcentre-m72zG482-Z54GA-Z77MX-D3H TH (rev. 1.0)GA-X99-Gaming G1 WIFI (rev. 1.0)G262-IR0GA-Z170MX-Gaming 5R162-ZA1GA-9SISL (rev. 1.2)ME03-PE0 (rev. 1.x)GA-Z68M-D2HGA-H310MSTX-HD3ME03-CE0 (rev. 1.0)GA-B150-HD3 (rev. 1.0)R133-X13 (rev. AAB1)GB-BXPi3-4010 (rev. 1.0)GB-BER7-5800GA-H170-Gaming 3GB-BXCE-2955 (rev. 1.0)GA-H170M-HD3 DDR3GB-BXi7G3-760GA-P67-DS3-B3W331-Z00 (rev. 100)G293-Z42 (rev. IAP1)GA-6UASL3 (rev. 1.x/2.x)GA-Z68AP-D3GA-Z68XP-UD3-iSSD (rev. 1.0)G1.Sniper M3GB-BSi7H-6500-LA-IW (rev. 1.0)GA-Z68P-DS3 (rev. 2.0)MD72-HB2 (rev. 1.x/2.x)GB-BRR7-4700GA-6LASH (rev. 1.0)GA-Z170M-D3H DDR3 (rev. 1.0)GA-Z68XP-UD3H262-PC2GA-Z68X-UD4-B3 (rev. 1.0)GB-BNi7G4-950 (rev. 1.0)MDH11JI (rev. 1.0)R163-Z35 (rev. AAC1)GB-BSRE-1605 (rev. 1.0)GA-B75-D3V (rev. 1.0)MZ72-HB0 (rev. 1.x)G291-2G0 (rev. 100)GA-B75M-D3H (rev. 1.0)hp-z420-workstationGB-BXi3-4010 (rev. 1.0)GA-SBC4100 (rev. 1.0)PRIMERGY CX420 S1 ChassisGA-H110M-S2 DDR3G492-ZD0GA-H77M-D3H (rev. 1.0)GA-Z170N-Gaming 5 (rev. 1.0)GA-6LISL (rev. 1.1)R182-NA0G293-Z20inspiron-3656-desktopTO25-S11 (rev. AA01)TO15-Z40GA-Z170XP-SLIc24-962GA-Z170X-DesignareGA-Z68A-D3H-B3 (rev. 1.0)GA-IMB4100TNinspiron-17-3782-laptopC621 AORUS XTREME (rev. 1.0)S453-S70GA-IMB1900TN (rev. 1.0)GA-B150M-DS3H (rev. 1.0)EL-20-3060-32G (rev. 1.0)X299 UD4 EX (rev. 1.0)H23N-H60G591-HS0MVBAYAI (rev. 1.0)G190-G30MX34-BS0 (rev. 1.0)altos r680s f4G242-Z11vostro-20-3015-aioinspiron-3655-desktopTO25-Z12 (rev. AA01)GB-BRR7-4800GA-P67A-D3-B3GA-F2A55M-DS2 (rev. 1.0)MD70-HB2 (rev. 1.0)GA-N3050N-D2P (rev. 1.0)H261-NO0GA-6LXSV (rev. 1.2)R163-S30 (rev. AAB1)GA-H110TN (rev. 1.0)GB-BACE-3010 (rev. 1.0)alienware-alphaGA-X99-UD4P (rev. 1.0)AU47 M1R161-340 (rev. 100/200)GA-H170-D3H (rev. 1.0)hp-z228-microtower-workstationG293-S45MW51-HP0 (rev. 1.x)R130-134vostro-20-3052-aioGA-Z77-D3HGA-J1800N-D2P (rev. 1.0)R281-3C2H262-Z6AH270-F4G (rev. 100)GB-BNi7HG4-950R182-340 (rev. 100)inspiron-one-23-2330-aioMX33-BS0 (rev. 1.x)GA-B75M-D2V (rev. 1.0)GA-H170N-WIFIGA-Z77X-D3H (rev. 1.0)GA-N3160N-D3V (rev. 1.0)R272-Z30 (rev. 100)GB-BXCE-3205MD80-TM0 (rev. 1.0)vz2694gH263-V60G363-ZR0G292-Z45S251-3O0 (rev. 100)GA-Z77X-UP4 TH (rev. 1.0)ME33-AR0 (rev. 1.0)G221-Z30R270-R3C (rev. 143)B760M D2HX LITE SI (rev. 1.0)GA-X99-UD5 WIFIR123-C00GB-BSi5A-6300 (rev. 1.0)inspiron-24-5459-aioH261-H61 (rev. 100)MD71-HB1 (rev. 1.x)alienware-aurora-r14-desktopG250-G50 (rev. 400)R292-4S0GA-E6010N (rev. 1.0)GB-BXi7-5500alienware-aurora-r15-desktopMC12-LE0 (rev. 1.x)E133-C10 (rev. AAA1)inspiron-22-3265-desktop-aioGA-J1800M-D3P (rev. 1.x)GA-B150-HD3PH262-NO0GA-B150N Phoenix-WIFI (rev. 1.0)GA-B150M-DS3H DDR3GB-KMA1 (rev. 1.0)G210-H4G (rev. 100)GA-Z68XP-UD3R (rev. 1.0)inspiron-15-3521-laptopH252-3C0 (rev. 100)S451-3R0GA-H61M-S2P-R3 (rev. 3.0)GB-BNi7HG4-1050Ti (rev. 1.0)W42G-P08RGB-KMA3 (rev. 1.0)G292-Z40GA-B75M-S (rev. 1.0)R263-Z34 (rev. AAH1)MZBAYVA (rev. 1.2)GA-Z170X-Gaming 7GA-H110M-M.2GA-H61TN (rev. 1.1)GB-BNi7HG6-1060 (rev. 1.0)GB-BRi7-10510 (rev. 1.0)R163-S35 (rev. AAH1)MDH11TI (rev. 1.0)GA-Z170X-SOC FORCEE133-C10MU71-SU0 (rev. 1.x)GA-6UASV3 (rev. 1.0)GA-H110M-S2PHX299 AORUS Gaming 7 (rev. 1.0)GA-J1800N-D2H (rev. 1.x)H223-Z10 (rev. AAP1)R283-ZF0 (rev. IAL1)GA-H310TN-CMG482-Z54 (rev. 100)GA-X150M-PLUS WSMW50-SV0 (rev. 1.0)GA-H110M-WWinspiron-3646-small-desktopG482-Z50MU92-TU1 (rev. 1.x/2.x)R283-Z94GA-B150M-D3V DDR3GA-H77-D3H-MVP (rev. 1.0)R162-ZA2GA-X99P-SLIG292-280G182-C20MX32-BS0 (rev. 1.0)G292-Z40 (rev. 100)GA-H97TN (rev. 1.0)GA-H110M-H DDR3GA-B75M-D3VR183-S90 (rev. LAD1)MF51-ES2 (rev. 1.0)
CVE-2023-25496
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-7.8||HIGH
EPSS-0.03% / 8.16%
||
7 Day CHG~0.00%
Published-28 Apr, 2023 | 21:13
Updated-30 Jan, 2025 | 18:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A privilege escalation vulnerability was reported in Lenovo Drivers Management Lenovo Driver Manager that could allow a local user to execute code with elevated privileges.

Action-Not Available
Vendor-Lenovo Group Limited
Product-drivers_managementLenovo Drivers Management
CWE ID-CWE-284
Improper Access Control
CVE-2024-4131
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-7.8||HIGH
EPSS-0.04% / 10.61%
||
7 Day CHG~0.00%
Published-11 Oct, 2024 | 15:15
Updated-17 Oct, 2024 | 19:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A DLL hijack vulnerability was reported in Lenovo Emulator that could allow a local attacker to execute code with elevated privileges.

Action-Not Available
Vendor-Lenovo Group Limited
Product-emulatorEmulatoremulator
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2024-4130
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-7.8||HIGH
EPSS-0.04% / 10.61%
||
7 Day CHG~0.00%
Published-11 Oct, 2024 | 15:15
Updated-17 Oct, 2024 | 19:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A DLL hijack vulnerability was reported in Lenovo App Store that could allow a local attacker to execute code with elevated privileges.

Action-Not Available
Vendor-Lenovo Group Limited
Product-app_storeApp Storeapp_store
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2021-4211
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 10.91%
||
7 Day CHG~0.00%
Published-22 Apr, 2022 | 20:30
Updated-03 Aug, 2024 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A potential vulnerability in the SMI callback function used in the SMBIOS event log driver in some Lenovo Desktop, ThinkStation, and ThinkEdge models may allow an attacker with local access and elevated privileges to execute arbitrary code.

Action-Not Available
Vendor-Lenovo Group Limited
Product-a340-24ickthinkcentre_m90a_\(gen_2\)thinkcentre_m90a_\(gen_2\)_firmwarev30a-24imlthinkcentre_m910xideacentre_aio_3-27itl6_firmwarethinkcentre_m720eideacentre_aio_3-22ada6ideacentre_aio_3-27itl6se30_firmwareideacentre_aio_3-22ada6_firmwarethinkstation_p320a340-22icb_firmwarethinkcentre_m800thinkstation_p320_tinyv410z_firmwareideacentre_510s-07icbthinkcentre_m900thinkcentre_m910sthinkcentre_m710q_firmwarethinkstation_p320_firmwarev520thinkcentre_m710ethinkcentre_m710t_firmwarethinkcentre_m75n_firmwarethinkstation_p310_firmwarethinkcentre_m910qthinkstation_p310thinkcentre_m720e_firmwareideacentre_5-14iob6v530-15icb_firmwareideacentre_510s-07ick_firmwarev530s-07icb_firmwarethinkcentre_m810zthinkcentre_m800_firmwarethinkcentre_m75nthinkcentre_m810z_firmwareideacentre_5-14iob6_firmwarethinkcentre_m710qideacentre_aio_3-22itl6_firmwarethinkcentre_m710tv30a-24iml_firmwarethinkcentre_m70a_firmwarea340-22ickv530-15icrideacentre_aio_3-24ada6_firmwarev530s-07icbthinkcentre_m710e_firmwarethinkcentre_m900_firmwarev530-15icba540-27icbv520s_firmwareideacentre_aio_3-22iil5_firmwareideacentre_510s-07icb_firmwarea340-24ick_firmwarev410zthinkstation_p320_tiny_firmwarea340-24icb_firmwareideacentre_creator_5-14iob6se30thinkcentre_m900x_firmwarea540-27icb_firmwarethinkcentre_m700_tinyv30a-22imlv520_firmwareideacentre_aio_3-24itl6thinkcentre_m710q_\(10yc\)ideacentre_aio_3-24ada6a540-24icbthinkcentre_m70av30a-22iml_firmwarethinkcentre_m820z_firmwareideacentre_aio_3-24itl6_firmwarev530s-07icr_firmwarev540-24iwl_firmwareideacentre_510s-07icka540-24icb_firmwarev530s-07icrthinkcentre_m710s_firmwareideacentre_aio_3-22iil5thinkcentre_m910x_firmwarethinkcentre_m910s_firmwarethinkcentre_m820zthinkcentre_m910t_firmwarev50t-13iob_g2_firmwarev50t-13iob_g2a340-22icbthinkcentre_m710sideacentre_gaming_5-14iob6_firmwarethinkcentre_m900xideacentre_aio_3-24iil5thinkcentre_m710q_\(10yc\)_firmwareideacentre_gaming_5-14iob6v520sideacentre_aio_3-22itl6thinkcentre_m910tv530-15icr_firmwareideacentre_aio_3-24iil5_firmwarethinkcentre_m700_tiny_firmwarethinkcentre_m600_firmwareideacentre_creator_5-14iob6_firmwarea340-24icbv540-24iwlthinkcentre_m600thinkcentre_m910q_firmwarea340-22ick_firmwareBIOS
CWE ID-CWE-20
Improper Input Validation
CVE-2021-4210
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-6.7||MEDIUM
EPSS-0.11% / 30.04%
||
7 Day CHG~0.00%
Published-22 Apr, 2022 | 20:30
Updated-03 Aug, 2024 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A potential vulnerability in the SMI callback function used in the NVME driver in some Lenovo Desktop, ThinkStation, and ThinkEdge models may allow an attacker with local access and elevated privileges to execute arbitrary code.

Action-Not Available
Vendor-Lenovo Group Limited
Product-thinkstation_p520_firmwareideacentre_aio_3-27itl6_firmwarethinkcentre_m910zideacentre_aio_3-27itl6ideacentre_aio_3-22ada6ideacentre_aio_3-22ada6_firmwarethinkcentre_m800v410z_firmwarethinkcentre_m900ideacentre_g5-14imb05_firmwarethinkstation_p520thinkcentre_m90a_gen2v50t-13imbthinkcentre_x1thinkcentre_m700thinkcentre_m75n_firmwarethinkstation_p310_firmwarethinkstation_p310thinkedge_se30thinkcentre_m700_firmwarethinkcentre_m810zthinkcentre_m800_firmwarethinkcentre_m75nthinkcentre_m810z_firmwareideacentre_aio_3-22itl6_firmwarethinkedge_se30_firmwarethinkcentre_m70a_firmwareideacentre_aio_3-24ada6_firmwarethinkcentre_m900_firmwarea540-27icbstadia_ggp-120_firmwareideacentre_aio_3-22iil5_firmwarev410zstadia_ggp-120ideacentre_c5-14imb05thinkcentre_m900x_firmwarea540-27icb_firmwareideacentre_5-14imb05thinkcentre_m700_tinyideacentre_aio_3-24itl6thinkstation_p520c_firmwarethinkcentre_m90a_gen2_firmwareideacentre_c5-14imb05_firmwarea540-24icbthinkcentre_m70aideacentre_aio_3-24ada6thinkcentre_m820z_firmwareideacentre_aio_3-24itl6_firmwarev540-24iwl_firmwarea540-24icb_firmwareideacentre_aio_3-22iil5ideacentre_5-14imb05_firmwarev50t-13imb_firmwarethinkcentre_m820zthinkcentre_m900xideacentre_aio_3-24iil5thinkcentre_m910z_firmwareideacentre_aio_3-22itl6ideacentre_g5-14imb05thinkcentre_x1_firmwareideacentre_aio_3-24iil5_firmwarethinkcentre_m700_tiny_firmwarev540-24iwlthinkstation_p520cBIOS
CWE ID-CWE-20
Improper Input Validation
CVE-2021-42850
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-8.8||HIGH
EPSS-0.04% / 11.77%
||
7 Day CHG~0.00%
Published-18 May, 2022 | 16:10
Updated-04 Aug, 2024 | 03:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A weak default administrator password for the web interface and serial port was reported in some Lenovo Personal Cloud Storage devices that could allow unauthorized device access to an attacker with physical or local network access.

Action-Not Available
Vendor-Lenovo Group Limited
Product-t2prot1_firmwaret2pro_firmwarex1t1x1_firmwaret2t2_firmwarea1_firmwarea1Personal Cloud Storage X1Personal Cloud Storage T1Personal Cloud Storage A1Personal Cloud Storage T2Personal Cloud Storage T2Pro
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2021-4212
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-6.7||MEDIUM
EPSS-0.11% / 30.01%
||
7 Day CHG~0.00%
Published-22 Apr, 2022 | 20:30
Updated-03 Aug, 2024 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A potential vulnerability in the SMI callback function used in the Legacy BIOS mode driver in some Lenovo Notebook models may allow an attacker with local access and elevated privileges to execute arbitrary code.

Action-Not Available
Vendor-Lenovo Group Limited
Product-ideapad_5_pro-16ihu6_firmwareideapad_gaming_3-15imh05_firmwarel340-17irh_firmwareideapad_5-14alc05ideapad_5-14alc05_firmwarel340-15iwl_touch_firmwareideapad_5_pro-16ihu6ideapad_gaming_3-15ach6legion_y545_firmwareslim_7-14itl05yoga_creator_7-15imh05e41-50_firmwareyoga_6-13alc6_firmwarel340-15iwl_firmwareflex-14imllegion_y545ideapad_5-15itl05_firmwareyoga_slim_7-15imh05yoga_slim_7-15iil05ideapad_3-14are05s540-14imlslim_7-14itl05_firmwarel340-17iwlyoga_creator_7-15imh05_firmwarelegion_y540-15irh-pg0_firmwareideapad_5-15itl05s340-14imllegion_y7000-2019-pg0ideapad_gaming_3-15imh05slim_7-14are05ideapad_3-17are05_firmwarethinkbook_plus_g2_itgideapad_3-15are05s340-13imlideapad_5_pro-14acn6yoga_slim_7-15imh05_firmwareideapad_5-14are05legion_y540-15irh-pg0ideapad_creator_5-15imh05s340-15apis340-15imlideapad_5_pro-14acn6_firmwareyoga_slim_7-14itl05_firmwareyoga_slim_7-15itl05v140-15iwl_firmwares540-14iml_firmwareideapad_gaming_3-15arh05_firmwares540-14iml_touchslim_7-14are05_firmwarelegion_y540-17irh-pg0_firmwareideapad_3-15are05_firmwareyoga_slim_7-14are05slim_7-15imh05d330-10igm_firmwarel340-15iwlideapad_5_pro-14itl6_firmwares340-14api_firmwares340-14apilegion_y540-17irhl340-15irhs340-15iml_firmwarelegion_y7000-2019-pg0_firmwareslim_7-15itl05_firmwarelegion_y545-pg0_firmwarev340-17iwls340-14iml_firmwarelegion_y7000-2019_firmwareideapad_gaming_3-15ach6_firmwareyoga_slim_7-14iil05yoga_slim_7_carbon_13itl5legion_y540-17irh_firmwareslim_7-15iil05yoga_6-13alc6ideapad_3-17are05yoga_slim_7-14iil05_firmwarel340-17iwl_firmwareyoga_slim_7_carbon_13itl5_firmwarec340-15imlideapad_5_pro-14itl6d330-10igmlegion_y540-17irh-pg0flex-15iml_firmwarethinkbook_13x_itgduet_3-10igl5thinkbook_13x_itg_firmwares340-13iml_firmwarev14-areyoga_slim_7-15iil05_firmwares340-15api_touchyoga_slim_7-14are05_firmwareflex-15imll340-15iwl_touchthinkbook_plus_g2_itg_firmwarev14-are_firmwarev340-17iwl_firmwares540-14iml_touch_firmwareideapad_creator_5-15imh05_firmwarec340-15iml_firmwareslim_7-15itl05ideapad_gaming_3-15arh05slim_7-15imh05_firmwareflex-14iml_firmwares340-15api_firmwareduet_3-10igl5_firmwarelegion_y540-15irh_firmwares340-15api_touch_firmwareslim_7-15iil05_firmwarelegion_y7000-2019c340-14imls540-15iml_firmwarethinkbook_14_g3_itl_firmwareyoga_slim_7-15itl05_firmwarelegion_y540-15irhe41-50yoga_slim_7-14itl05ideapad_3-14are05_firmwarec340-14iml_firmwares540-15imlideapad_5-14are05_firmwarev140-15iwll340-15irh_firmwarelegion_y545-pg0l340-17irhthinkbook_14_g3_itlBIOS
CWE ID-CWE-20
Improper Input Validation
CVE-2021-3970
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-6.7||MEDIUM
EPSS-0.44% / 62.31%
||
7 Day CHG~0.00%
Published-22 Apr, 2022 | 20:30
Updated-03 Aug, 2024 | 17:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A potential vulnerability in LenovoVariable SMI Handler due to insufficient validation in some Lenovo Notebook models BIOS may allow an attacker with local access and elevated privileges to execute arbitrary code.

Action-Not Available
Vendor-Lenovo Group Limited
Product-l340-17irh_firmwareideapad_3-17ada05_firmwarev14_g2-itl_firmwareideapad_3-17itl6legion_5-15ith6hideapad_3-14ada05legion_y545_firmwarelegion_5-15imh6s145-15api_firmwareslim_9-14itl05slim_7_pro-14ihu5legion_y545ideapad_3-17itl6_firmwareyoga_slim_7_pro-14ihu5_olegion_5-17ach6legion_5-15ith6h_firmwarel340-17iwlyoga_c740-14imllegion_5_pro-16ith6legion_5-17ith6hyoga_slim_7_pro-14itl5ideapad_3-17are05_firmwares145-14ast_firmwares145-14iil_firmwarelegion_5-15ach6alegion_5-17ith6_firmwareyoga_slim_9-14itl05_firmwarelegion_y540-15irh-pg0ideapad_3-14igl05_firmwarev14-ada_firmwareideapad_3-14itl05_firmwareyoga_slim_7_pro-14ach5_od_firmwareideapad_3-14iml05_firmwarelegion_5-15imh6_firmwarev140-15iwl_firmwarev14-iilyoga_c940-14iillegion_5_pro-16ach6h_firmwares145-14igmslim_7_pro-14ihu5_firmwarelegion_5-17ach6h_firmwarev15_g1-imlv17-iils540-13iml_firmwareideapad_3-17alc6v14-iil_firmwarelegion_y540-17irhl340-15irhideapad_3-17iml05ideapad_3-17iil05_firmwares540-13api_firmwarev340-17iwlideapad_3-15igl05s145-14igm_firmwareyoga_slim_7_pro-14itl5_firmwares145-15ast_firmwareideapad_5-15are05_firmwareideapad_3-15itl6ideapad_3-15alc6yoga_7-14acn6_firmwareideapad_3-15ada05legion_y540-17irh_firmwareideapad_3-17are05ideapad_3-15ada6legion_5-15ach6legion_7-16ithg6_firmwarelegion_5-15ach6h_firmwareideapad_3-17ada6_firmwareideapad_3-17ada05l3-15itl6_firmwareideapad_3-14iml05yoga_slim_7_pro-14ihu5_o_firmwarev14-ares145-15astyoga_c740-15imls145-15igmv17_g2-itlideapad_3-15iml05s145-15iill340-15iwl_touchlegion_s7-15ach6_firmwareyoga_slim_7_pro-14ach5_firmwareyoga_slim_7_pro-14ach5_oideapad_3-15iil05_firmwarev15_g2-alc_firmwarelegion_5_pro-16ach6legion_y540-15irh_firmwares145-15apiv15_g2-itl_firmwarev14_g1-imllegion_5_pro-16ith6hl340-17irhyoga_slim_7_pro-14ach5_dyoga_slim_7_pro-14ach5ideapad_3-14are05_firmwareideapad_3-14alc6_firmwarelegion_5_pro-16ach6_firmwarev140-15iwllegion_y545-pg0ideapad_3-14igl05l3_15iml05v15-igl_firmwareideapad_gaming_3-15imh05_firmwareideapad_3-15itl05legion_7-16ithg6ideapad_3-15iml05_firmwarelegion_5-17ach6hl340-15iwl_touch_firmwarev15-iillegion_s7-15ach6ideapad_3-15iil05ideapad_3-14ada6ideapad_3-15ada6_firmwareideapad_3-17iml05_firmwarel340-15iwl_firmwarev14-igl_firmwareideapad_3-17ada6legion_5-15ach6a_firmwareyoga_c740-14iml_firmwarev15-ada_firmwareideapad_3-14are05legion_5-17ith6legion_5_pro-16ach6hv14_g2-acllegion_5-17ach6_firmwarelegion_y540-15irh-pg0_firmwareyoga_slim_7_pro-14arh5v15_g2-itlyoga_7-14acn6legion_5-17ith6h_firmwarelegion_5_pro-16ith6h_firmwarelegion_y7000-2019-pg0ideapad_3-14itl6ideapad_gaming_3-15imh05ideapad_3-15are05s540-13imlv15-adas14_g2_itls145-15igm_firmwareideapad_creator_5-15imh05yoga_slim_7_pro-14ach5_odv15_g1-iml_firmwarev15-iglideapad_5-15iil05_firmwarelegion_5-15ith6v17-iil_firmwarev17_g2-itl_firmwareyoga_slim_9-14itl05ideapad_gaming_3-15arh05_firmwarelegion_y540-17irh-pg0_firmwareideapad_3-15are05_firmwareyoga_slim_7_pro-14ach5_d_firmwarel340-15iwlideapad_3-15igl05_firmwareideapad_3-15itl05_firmwareideapad_5-15iil05s145-14api_firmwarelegion_y7000-2019-pg0_firmwarelegion_y545-pg0_firmwareyoga_slim_7_pro-14ach5_o_firmwarev14_g1-iml_firmwarelegion_y7000-2019_firmwareyoga_slim_7_pro-14arh5_firmwares145-14iilideapad_3-14alc6s145-15iil_firmwareslim_9-14itl05_firmwarev14-iglideapad_3-15itl6_firmwarev14_g2-itll340-17iwl_firmwares145-14astv15_g2-alcv15-iil_firmwareyoga_slim_7_pro-14ihu5ideapad_3-14itl6_firmwareideapad_5-15are05legion_y540-17irh-pg0legion_5-15ith6_firmwares14_g2_itl_firmwarel3_15iml05_firmwares145-14apiideapad_3-14ada05_firmwarev14-adav14_g2-acl_firmwareideapad_3-15alc6_firmwarev14-are_firmwareideapad_3-14ada6_firmwarev340-17iwl_firmwareideapad_3-17alc6_firmwareideapad_3-17iil05ideapad_3-15ada05_firmwareideapad_3-14iil05ideapad_3-14iil05_firmwareideapad_creator_5-15imh05_firmwareideapad_gaming_3-15arh05legion_y7000-2019yoga_c940-14iil_firmwareideapad_3-14itl05legion_y540-15irhl3-15itl6legion_5-15ach6_firmwares540-13apilegion_7-16achg6_firmwareyoga_c740-15iml_firmwareyoga_slim_7_pro-14ihu5_firmwarel340-15irh_firmwarelegion_5-15ach6hlegion_5_pro-16ith6_firmwarelegion_7-16achg6Notebook BIOS
CWE ID-CWE-20
Improper Input Validation
CVE-2021-3922
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-7.8||HIGH
EPSS-0.42% / 60.98%
||
7 Day CHG~0.00%
Published-18 May, 2022 | 16:10
Updated-03 Aug, 2024 | 17:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A race condition vulnerability was reported in IMController, a software component of Lenovo System Interface Foundation, prior to version 1.1.20.3 that could allow a local attacker to connect and interact with the IMController child process' named pipe.

Action-Not Available
Vendor-Lenovo Group Limited
Product-system_interface_foundationIMController
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2021-3843
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-6.7||MEDIUM
EPSS-0.04% / 9.87%
||
7 Day CHG~0.00%
Published-12 Nov, 2021 | 22:05
Updated-03 Aug, 2024 | 17:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A potential vulnerability in the SMI function to access EEPROM in some ThinkPad models may allow an attacker with local access and elevated privileges to execute arbitrary code.

Action-Not Available
Vendor-Lenovo Group Limited
Product-thinkpad_l15_gen_1thinkpad_x380_yogathinkpad_11e_4th_gen_i7_firmwarethinkpad_11e_4th_gen_celeron_firmwarethinkpad_t460_firmwarethinkpad_x260_firmwarethinkpad_x390_yoga_firmwarethinkpad_11e_4th_gen_i3_firmwarethinkpad_l380_firmwarethinkpad_l390thinkpad_11e_4th_gen_celeronthinkpad_l15_gen_1_firmwarethinkpad_11e_4th_gen_i3thinkpad_l14_gen_1thinkpad_l380thinkpad_11e_5th_genthinkpad_x1_fold_gen_1thinkpad_l390_yogathinkpad_11e_3rd_genthinkpad_s2_yoga_gen_6_firmwarethinkpad_x390_yogathinkpad_l15_firmwarethinkpad_s5_2nd_gen_firmwarethinkpad_x12_detachable_gen_1thinkpad_11e_5th_gen_firmwarethinkpad_x12_detachable_gen_1_firmwarethinkpad_l13_yoga_gen_2thinkpad_l13_firmwarethinkpad_l380_yogathinkpad_s5_2nd_genthinkpad_l14_gen_1_firmwarethinkpad_x1_fold_gen_1_firmwarethinkpad_l14thinkpad_l13thinkpad_l390_firmwarethinkpad_l13_yoga_gen_2_firmwarethinkpad_l14_firmwarethinkpad_t460thinkpad_l390_yoga_firmwarethinkpad_13_gen_2thinkpad_l15thinkpad_l13_gen_2_firmwarethinkpad_s2_yoga_gen_6thinkpad_x380_yoga_firmwarethinkpad_11e_4th_gen_i7thinkpad_l13_gen_2thinkpad_l380_yoga_firmwarethinkpad_11e_4th_gen_i5thinkpad_s2_gen_6thinkpad_11e_3rd_gen_firmwarethinkpad_x260thinkpad_l13_yogathinkpad_11e_yoga_gen_6_firmwarethinkpad_11e_4th_gen_i5_firmwarethinkpad_s2_gen_6_firmwarethinkpad_11e_yoga_gen_6thinkpad_yoga_370thinkpad_13_gen_2_firmwarethinkpad_l13_yoga_firmwareThinkPad BIOS
CWE ID-CWE-20
Improper Input Validation
  • Previous
  • 1
  • 2
  • 3
  • Next
Details not found