Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2021-3719

Summary
Assigner-lenovo
Assigner Org ID-da227ddf-6e25-4b41-b023-0f976dcaca4b
Published At-12 Nov, 2021 | 22:05
Updated At-03 Aug, 2024 | 17:01
Rejected At-
Credits

A potential vulnerability in the SMI callback function that saves and restore boot script tables used for resuming from sleep state in some ThinkCentre and ThinkStation models may allow an attacker with local access and elevated privileges to execute arbitrary code.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:lenovo
Assigner Org ID:da227ddf-6e25-4b41-b023-0f976dcaca4b
Published At:12 Nov, 2021 | 22:05
Updated At:03 Aug, 2024 | 17:01
Rejected At:
â–¼CVE Numbering Authority (CNA)

A potential vulnerability in the SMI callback function that saves and restore boot script tables used for resuming from sleep state in some ThinkCentre and ThinkStation models may allow an attacker with local access and elevated privileges to execute arbitrary code.

Affected Products
Vendor
Lenovo Group LimitedLenovo
Product
ThinkCentre and ThinkStation BIOS
Versions
Affected
  • various
Problem Types
TypeCWE IDDescription
CWECWE-20CWE-20 Improper Input Validation
Type: CWE
CWE ID: CWE-20
Description: CWE-20 Improper Input Validation
Metrics
VersionBase scoreBase severityVector
3.16.7MEDIUM
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 6.7
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Update system firmware to the version (or newer) indicated for your model in the Product Impact section in LEN-67440.

Configurations

Workarounds

Exploits

Credits

Lenovo thanks Jiawei Yin(@yngweijw), Menghao Li, and Chengxi, Chen of IIE varas for reporting this issue.
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://support.lenovo.com/us/en/product_security/LEN-67440
x_refsource_MISC
Hyperlink: https://support.lenovo.com/us/en/product_security/LEN-67440
Resource:
x_refsource_MISC
â–¼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://support.lenovo.com/us/en/product_security/LEN-67440
x_refsource_MISC
x_transferred
Hyperlink: https://support.lenovo.com/us/en/product_security/LEN-67440
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:psirt@lenovo.com
Published At:12 Nov, 2021 | 22:15
Updated At:19 Nov, 2021 | 21:57

A potential vulnerability in the SMI callback function that saves and restore boot script tables used for resuming from sleep state in some ThinkCentre and ThinkStation models may allow an attacker with local access and elevated privileges to execute arbitrary code.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.16.7MEDIUM
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Secondary3.16.7MEDIUM
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Primary2.07.2HIGH
AV:L/AC:L/Au:N/C:C/I:C/A:C
Type: Primary
Version: 3.1
Base score: 6.7
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 6.7
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 7.2
Base severity: HIGH
Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CPE Matches

Lenovo Group Limited
lenovo
>>thinkcentre_e93_firmware>>Versions before fbktdfa(exclusive)
cpe:2.3:o:lenovo:thinkcentre_e93_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_e93>>-
cpe:2.3:h:lenovo:thinkcentre_e93:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m600_firmware>>Versions before m00kt65a(exclusive)
cpe:2.3:o:lenovo:thinkcentre_m600_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m600>>-
cpe:2.3:h:lenovo:thinkcentre_m600:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m700_tiny_firmware>>Versions before fwktb9a(exclusive)
cpe:2.3:o:lenovo:thinkcentre_m700_tiny_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m700_tiny>>-
cpe:2.3:h:lenovo:thinkcentre_m700_tiny:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m73_firmware>>Versions before fhkt86a(exclusive)
cpe:2.3:o:lenovo:thinkcentre_m73_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m73>>-
cpe:2.3:h:lenovo:thinkcentre_m73:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m73p_firmware>>Versions before fbktdfa(exclusive)
cpe:2.3:o:lenovo:thinkcentre_m73p_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m73p>>-
cpe:2.3:h:lenovo:thinkcentre_m73p:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m800_firmware>>Versions before fwktb9a(exclusive)
cpe:2.3:o:lenovo:thinkcentre_m800_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m800>>-
cpe:2.3:h:lenovo:thinkcentre_m800:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m818z_firmware>>Versions before m1ekt23a(exclusive)
cpe:2.3:o:lenovo:thinkcentre_m818z_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m818z>>-
cpe:2.3:h:lenovo:thinkcentre_m818z:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m83_firmware>>Versions before fbktdfa(exclusive)
cpe:2.3:o:lenovo:thinkcentre_m83_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m83>>-
cpe:2.3:h:lenovo:thinkcentre_m83:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m900_firmware>>Versions before fwktb9a(exclusive)
cpe:2.3:o:lenovo:thinkcentre_m900_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m900>>-
cpe:2.3:h:lenovo:thinkcentre_m900:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m900x_firmware>>Versions before fwktb9a(exclusive)
cpe:2.3:o:lenovo:thinkcentre_m900x_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m900x>>-
cpe:2.3:h:lenovo:thinkcentre_m900x:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m93_firmware>>Versions before fbktdfa(exclusive)
cpe:2.3:o:lenovo:thinkcentre_m93_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m93>>-
cpe:2.3:h:lenovo:thinkcentre_m93:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m93p_firmware>>Versions before fbktdfa(exclusive)
cpe:2.3:o:lenovo:thinkcentre_m93p_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m93p>>-
cpe:2.3:h:lenovo:thinkcentre_m93p:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m4500q_firmware>>Versions before fhkt86a(exclusive)
cpe:2.3:o:lenovo:thinkcentre_m4500q_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m4500q>>-
cpe:2.3:h:lenovo:thinkcentre_m4500q:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m6500t\/s_firmware>>Versions before fbktdfa(exclusive)
cpe:2.3:o:lenovo:thinkcentre_m6500t\/s_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m6500t\/s>>-
cpe:2.3:h:lenovo:thinkcentre_m6500t\/s:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m8500t\/s_firmware>>Versions before fbktdfa(exclusive)
cpe:2.3:o:lenovo:thinkcentre_m8500t\/s_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_m8500t\/s>>-
cpe:2.3:h:lenovo:thinkcentre_m8500t\/s:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_x1_firmware>>Versions before m0hkt50a(exclusive)
cpe:2.3:o:lenovo:thinkcentre_x1_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkcentre_x1>>-
cpe:2.3:h:lenovo:thinkcentre_x1:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkstation_p300_firmware>>Versions before fbktdfa(exclusive)
cpe:2.3:o:lenovo:thinkstation_p300_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkstation_p300>>-
cpe:2.3:h:lenovo:thinkstation_p300:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkstation_p500_firmware>>Versions before a4ktaba(exclusive)
cpe:2.3:o:lenovo:thinkstation_p500_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkstation_p500>>-
cpe:2.3:h:lenovo:thinkstation_p500:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkstation_p700_firmware>>Versions before a5ktaba(exclusive)
cpe:2.3:o:lenovo:thinkstation_p700_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkstation_p700>>-
cpe:2.3:h:lenovo:thinkstation_p700:-:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkstation_p900_firmware>>Versions before a6ktaba(exclusive)
cpe:2.3:o:lenovo:thinkstation_p900_firmware:*:*:*:*:*:*:*:*
Lenovo Group Limited
lenovo
>>thinkstation_p900>>-
cpe:2.3:h:lenovo:thinkstation_p900:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-noinfoPrimarynvd@nist.gov
CWE-20Secondarypsirt@lenovo.com
CWE ID: NVD-CWE-noinfo
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-20
Type: Secondary
Source: psirt@lenovo.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://support.lenovo.com/us/en/product_security/LEN-67440psirt@lenovo.com
Vendor Advisory
Hyperlink: https://support.lenovo.com/us/en/product_security/LEN-67440
Source: psirt@lenovo.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

617Records found

CVE-2020-8318
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-7.3||HIGH
EPSS-0.12% / 31.44%
||
7 Day CHG~0.00%
Published-14 Apr, 2020 | 21:05
Updated-16 Sep, 2024 | 22:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A privilege escalation vulnerability was reported in the LenovoSystemUpdatePlugin for Lenovo System Interface Foundation prior to version that could allow an authenticated user to execute code with elevated privileges.

Action-Not Available
Vendor-Lenovo Group Limited
Product-system_interface_foundationLenovoSystemUpdatePlugin for Lenovo System Interface Foundation
CVE-2020-8321
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-6.4||MEDIUM
EPSS-0.14% / 33.65%
||
7 Day CHG~0.00%
Published-09 Jun, 2020 | 19:50
Updated-17 Sep, 2024 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A potential vulnerability in the SMI callback function used in the System Lock Preinstallation driver in some Lenovo Notebook and ThinkStation models may allow arbitrary code execution.

Action-Not Available
Vendor-Lenovo Group Limited
Product-s340-15iwl_touchl340-17irh_firmwarev330-14isk_firmwarev330-14igm_firmwarelegion_y545_firmwares540-15iwl_gtxxiaoxin_air-15iwl_2019_firmware130-15ikb_firmwarelegion_y740-17ichgthinkstation_p520thinkstation_p500v130-14ast_firmwareyoga_c740-14imlrescuer_y7000p\(1060\)l340-15api_touch_firmware130-14ikb_firmwareideapad_3_15iil05_firmwares340-14legion_y7000_2019_firmware330c-14ikb_firmware330-14igm_firmwarethinkstation_p510v330-14astideapad_3_15330-15ikbrs340-15iwl340c-15ikb530s-14ikb_firmwarev320-14ikb_firmwares145-14igmy7000_2019_1050_firmwarec340-14iwl_firmwarexx-14kb_qc_2019_firmwares540-15iwllegion_y540-17irhl340-15irhs540-14iwl_firmware340c-15iwle4-14arr_firmwares145-14igm_firmwarexiaoxin_air-14iwl_2019_firmware330c-15ikbr_firmwareyoga_720-12ikb_firmware330c-14ikblegion_y540-17irh_firmwares540-14iwl_touch_firmwarelegion_y740-15ichg330-15ikbr_firmwarexiaoxin-14igm_qc_2019zhaoyang_k42-80_firmwareyoga_730-15ikb_firmwareflex_6-1470l340-15api_firmwareideapad_5_15iil05_firmwares340-13iml_firmwarethinkstation_p520c_firmwarelegion_y7000_2019l340-15iwl_touchs340-14iwllegion_y740-17irhg340c-15ikb_firmwarethinkstation_p900_firmwarexiaoxin_air-15iwl_2019c340-15iml_firmwarev330-15ast_firmwareflex-14iwls340-14iilflex-15iwl_firmwarev320-14ikbyoga_720-12ikblegion_y540-15irh_firmwarey7000_2019_1050320c-15ikb_firmwarethinkstation_p720_firmwarev330-14isk330-17ikbc340-14iml_firmware330-17ichl340-15api_touchideapad_3_17iml05_firmwares340-15iwl_touch_firmwarev130-14igms540-14iwl_touchv145-14ast_firmwarezhaoyang_k42-80l340-15iwl_touch_firmwares340-14iwl_touch_firmwarelenovo_v720-14ikbideapad_3_14iil05_firmwares540-15iwl_firmwarethinkstation_p900yoga_s740-14iil_firmwareyoga_c740-14iml_firmwares540-14imllegion_y540-15_pg0_firmware330-14ikb_firmwarev330-14ast_firmware330-14igmyoga_530-14arrthinkstation_p700_firmwareyoga_530-14arr_firmwarev130-14ikb330-15ikb_firmwarelenovo_v320-17ikbyoga_s740-14iilrescuer_y7000\(1060\)c340-14iwlyoga_730-13iwl_firmware340c-15iwl_firmwarexiaoxin-13iml_firmwarelenovo_v320-17ikb_firmwarexiaoxin_air_15ikbr_firmwarev330-15ast530s-14ikbthinkstation_p500_firmwarel340-15apiflex_6-1470_firmware330-15ikbr_touchs550-14iil_firmwareflex_6-14ikb_firmwares145-15ikb330-15ich_firmware330-14ikbr_firmwares340-15iml_firmwarev145-15astyoga_c930-13ikbv130-15ast330-17ikbrl340-17iwl_firmwarec340-15iml340c-15igm_firmwareideapad_5_15iil05s550-14iil330-15igm_firmwares540-14apilegion_y9000p_2019_firmware330-15ichlegion_y9000p_2019v130-14ikb_firmware330-15igm330c-15ikb_firmware330-15arrs145-14ikb_firmwarec340-15iwlwei5-14ikb_firmwarethinkstation_p700s145-14130-14ast_firmwarelegion_y740-15irhg_firmwareyoga_c930-13ikb_firmwarelegion_y7000p_2019s145-15iwl_firmwarexiaoxin_air_15iwl_firmwares540-15iml_firmwarec340-14imllegion_y545_pg0s145-15iwls340-14_firmwarelegion_y730-15ich_firmware330-14ikbideapad_3_14s145-15ikb_firmware530s-15iwl330c-15ikbl340-15irh_firmwarel340-17irhs530-13iml_firmware530s-14iwl_firmwarerescuer_y7000p\(1060\)_firmwaree43-80_kbl_firmware130-15ast_firmwarethinkstation_p910ideapad_3_15_firmwarelegion_y540-17_pg0530s-15ikblegion_y730-15ich530s-14arryoga_c940legion_y545s340-14iil_firmwarexiaoxin-14_2019iwlideapad_3_17iml05yoga_530-14ikb_firmwarelegion_y740-15ichg_firmwarethinkstation_p410wei5-14ikbxiaoxin-14_2019iwl_firmwarexiaoxin-14iwl_qc_2019_firmwareyoga_730-15iwl_firmwarel340-17iwls530-13iwlrescuer_y7000330-15arr_firmwarexiaoxin_air_14arr_firmwares540-15iwl_gtx_firmwares340-14imls530-13iml130-14astideapad_3_14_firmware330-17ikb_firmwarel340-17api_firmwares540-14iwlxx-14kb_qc_2019s145-14ikbs340-15apik43c-80v330-14arrlegion_y540-15_pg0330-15ikbr_touch_firmwarexiaoxin_air_13iwlv320-17ikbr_firmwares540-14iml_firmwareyoga_530-14ikbe4-14arrlegion_y740-17ichg_firmwarec340-14apiv320-15ikb_firmwarelegion_y530-15ich-1060_firmwares340-14api_firmwarexiaoxin_air-14iwl_2019k43c-80_firmware130-14ikbthinkstation_p710s340-14iml_firmwareyoga_c930_glasslegion_y9000k_2019yoga_c930_glass_firmwares340-14iwl_touchlegion_y740-17irhg_firmwarelenovo_e41-25yoga_730-15iwl720s-13arr_firmwarelegion_y7000p-1060_firmwarexiaoxin_air_14ikbr_firmwarexiaoxin_air_14iwl330-17ich_firmwareyoga_c740-15imlxiaoxin-15_2019iwl_firmwares145-15igmflex-15iwllegion_y730-17ich_firmwareflex_6-14arrthinkstation_p720xiaoxin_air_14ikbrc340-15iwl_firmware330-15arr_touch_firmwares340-15api_firmwarelegion_y7000p_pg0thinkstation_p920_firmwarethinkstation_p910_firmwarexiaoxin-13imlthinkstation_p410_firmwarel3_15iml05720s-14ikbr_firmwarexiaoxin_air_15iwlv130-15ast_firmware330-14ikbrlegion_y740-15irhgyoga_730-13ikbthinkstation_p520_firmware530s-15iwl_firmwarexiaoxin_air_13iwl_firmware330-15arr_touchd335-10igm340c-15igmrescuer_y7000prescuer_y7000\(1060\)_firmwarethinkstation_p510_firmwarerescuer_y7000p_firmwarev330-14arr_firmwareyoga_730-13iwl530s-14iwlv145-14astlegion_y7000p_pg0_firmwares340-14iwl_firmwarelegion_y545_pg0_firmware530s-14arr_firmwares340-13imlideapad_3_15iil05s145-15igm_firmwares340-15imlxiaoxin_air_14arr130-15ikblegion_y730-17ich530s-15ikb_firmwarec340-15iils340-15iwl_firmware330-15ikbv330-14igmlegion_y9000k_2019_firmwared330-10igm_firmwareyoga_730-13ikb_firmwares340-14apilegion_y540-17_pg0_firmware130-15astthinkstation_p710_firmwarel340-17apiv320-15ikbs145-14iwllegion_y7000p_2019_firmwarec340-14api_firmwareideapad_3_14iil05legion_y530-15ich720s-13arr320c-15ikblegion_y530-15ich-1060thinkstation_p920s530-13iwl_firmwarelenovo_e41-25_firmwarexiaoxin-14igm_qc_2019_firmwares540-14api_firmwared330-10igmlenovo_v720-14ikb_firmwarelegion_y530-15ich_firmwarel3_15iml05_firmware330c-15ikbrs145-14_firmwarexiaoxin_air_15ikbrxiaoxin_air_14iwl_firmwaree43-80_kblv130-14igm_firmware330-17ikbr_firmwareflex_6-14arr_firmwarelegion_y7000p-1060xiaoxin-14iwl_qc_2019c340-15iil_firmwares145-14iwl_firmwareyoga_c940_firmware720s-14ikbrlegion_y7000_pg0rescuer_y7000_firmwarev130-14astv145-15ast_firmwareflex_6-14ikblegion_y540-15irhlegion_y7000_pg0_firmwarev320-17ikbrxiaoxin-15_2019iwld335-10igm_firmwares540-15imlyoga_c740-15iml_firmwareyoga_730-15ikbflex-14iwl_firmwarethinkstation_p520cBIOS
CVE-2020-8338
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-7.8||HIGH
EPSS-0.05% / 15.93%
||
7 Day CHG~0.00%
Published-14 Oct, 2020 | 21:25
Updated-04 Aug, 2024 | 09:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A DLL search path vulnerability was reported in Lenovo Diagnostics prior to version 4.35.4 that could allow a user with local access to execute code on the system.

Action-Not Available
Vendor-Lenovo Group Limited
Product-diagnosticsDiagnostics
CWE ID-CWE-426
Untrusted Search Path
CVE-2020-8337
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-6.7||MEDIUM
EPSS-0.05% / 13.94%
||
7 Day CHG~0.00%
Published-09 Jun, 2020 | 19:50
Updated-16 Sep, 2024 | 18:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An unquoted search path vulnerability was reported in versions prior to 1.0.83.0 of the Synaptics Smart Audio UWP app associated with the DCHU audio drivers on Lenovo platforms that could allow an administrative user to execute arbitrary code.

Action-Not Available
Vendor-synapticsLenovo Group Limited
Product-thinkpad_s3-s440thinkpad_a275thinkpad_e485thinkpad_x380_yogas540-14iwl_touchthinkpad_a485thinkpad_e490yoga_14thinkpad_t450thinkpad_p53thinkpad_e450cthinkpad_l440thinkpad_e455thinkpad_e575thinkpad_e570thinkpad_l460thinkpad_t450sthinkpad_e540thinkpad_e560v130-15ikbthinkpad_p40thinkpad_a475thinkpad_e555thinkpad_l480thinkpad_e475thinkpad_s2_yoga_4th_genthinkpad_t460thinkpad_e550thinkpad_e565thinkpad_l450c340-14iwls540-14iwlthinkpad_l580thinkpad_11ethinkpad_x270thinkpad_r590thinkpad_a285thinkpad_t460pthinkpad_e580thinkpad_p1thinkpad_e460thinkpad_e545thinkpad_yoga_11ethinkpad_edge_e440thinkpad_s5thinkpad_edge_e445thinkpad_yoga_370thinkpad_l470v310-15igmthinkpad_13thinkpad_s1_yoga_12thinkpad_yoga_11e_3rd_genthinkpad_l380smart_audio_uwpthinkpad_l390_yogathinkpad_x1_extremethinkpad_s2_yoga_3rd_genthinkpad_s1_3rdthinkpad_e480thinkpad_l380_yogathinkpad_yoga_11e_5th_genthinkpad_s3thinkpad_s3_3rd_genthinkpad_r490thinkpad_s3_yoga_145-15ikbthinkpad_e470thinkpad_p73thinkpad_e585thinkpad_yoga_11e_4th_genflex-14iwlthinkpad_e590thinkpad_t470pair-14_2019thinkpad_e450thinkpad_e550cthinkpad_e490sthinkpad_x260thinkpad_l540v330-15igmthinkpad_e465v130-15igmthinkpad_yoga_14_460_s3Synaptics Smart Audio UWP App
CWE ID-CWE-428
Unquoted Search Path or Element
CVE-2015-8110
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.05% / 15.72%
||
7 Day CHG~0.00%
Published-24 Apr, 2017 | 06:12
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Lenovo System Update (formerly ThinkVantage System Update) before 5.07.0019 allows local users to gain privileges by navigating to (1) "Click here to learn more" or (2) "View privacy policy" within the Tvsukernel.exe GUI application in the context of a temporary administrator account, aka a "local privilege escalation vulnerability."

Action-Not Available
Vendor-n/aLenovo Group Limited
Product-lenovo_system_updaten/a
CVE-2018-9062
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-6.8||MEDIUM
EPSS-0.15% / 35.19%
||
7 Day CHG~0.00%
Published-19 Jul, 2018 | 19:00
Updated-05 Aug, 2024 | 07:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
BIOS Modules Unprotected by Intel Boot Guard Vulnerable to Physical Attack

In some Lenovo ThinkPad products, one BIOS region is not properly included in the checks, allowing injection of arbitrary code.

Action-Not Available
Vendor-Lenovo Group Limited
Product-thinkpad_t480_firmwarethinkpad_x1_carbon_firmwarev510-15ikb_firmwarethinkpad_t580_firmwarethinkpad_x380_yogathinkpad_l480_firmwarethinkpad_e580_firmwarethinkpad_t25thinkpad_t480sthinkpad_t57020k3thinkpad_p51_firmwarethinkpad_p51smiix_720-12ikb_firmwarethinkpad_x280_firmwaree42-80_isk_firmwarethinkpad_p72_firmware20kf20k420kj20lfv310-14ikbthinkpad_p52thinkpad_l480v310-15ikb_firmwaree42-80_iskthinkpad_t470s_firmwaree52-80e42-80thinkpad_l58020hqthinkpad_e580thinkpad_l580_firmwaree42-80_firmwarev510-15ikbthinkpad_x1_tablet_firmwarethinkpad_yoga_11ev310-15isk_firmwarethinkpad_p7120lethinkpad_t470p_firmwarethinkpad_e480_firmwarev310-15iskthinkpad_p51s_firmware20jbthinkpad_yoga_37020hrthinkpad_s1_firmwarev310-14ikb_firmware20ld20hn20k620kg20khthinkpad_t470v310-14iskthinkpad_l380_firmwarethinkpad_l380thinkpad_x270_firmwarethinkpad_t580thinkpad_x1_yoga_firmware20k520kkthinkpad_s120lgthinkpad_t570_firmwarethinkpad_e480thinkpad_t480s_firmwarethinkpad_p5120jev510-14ikbv310-15ikbe52-80_iskthinkpad_p52s_firmwarethinkpad_p71_firmware20jgmiix_720-12ikbv310-14isk_firmwarev510-14ikb_firmwarethinkpad_t470sthinkpad_p72thinkpad_x380_yoga_firmware20hmthinkpad_t470p20jf20ke20jdthinkpad_t25_firmware20jcthinkpad_yoga_370_firmwarethinkpad_t480e52-80_isk_firmwarethinkpad_p52_firmwarethinkpad_t470_firmwarethinkpad_p52sthinkpad_yoga_11e_firmwaree52-80_firmwaresome Lenovo ThinkPads
CWE ID-CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CVE-2015-3323
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-0.72% / 72.03%
||
7 Day CHG~0.00%
Published-16 Apr, 2015 | 23:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The ThinkServer System Manager (TSM) Baseboard Management Controller before firmware 1.27.73476 for ThinkServer RD350, RD450, RD550, RD650, and TD350 allows remote attackers to cause a denial of service (web interface crash) via a malformed HTTP request during authentication.

Action-Not Available
Vendor-n/aLenovo Group Limited
Product-thinkserver_system_manager_baseboard_management_controller_firmwarethinkserver_rd450thinkserver_rd650thinkserver_rd350thinkserver_rd550thinkserver_td350n/a
CWE ID-CWE-20
Improper Input Validation
CVE-2016-8106
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-5.9||MEDIUM
EPSS-2.58% / 85.25%
||
7 Day CHG~0.00%
Published-09 Jan, 2017 | 21:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Denial of Service in Intel Ethernet Controller's X710/XL710 with Non-Volatile Memory Images before version 5.05 allows a remote attacker to stop the controller from processing network traffic working under certain network use conditions.

Action-Not Available
Vendor-Lenovo Group LimitedHP Inc.Intel Corporation
Product-system_x3250_m5thinkserver_rd550ethernet_10gb_4-port_563sfp\+ethernet_converged_network_adapter_x710-da2_x710da2g2p5ethernet_10gb_2-port_562sfp\+system_x3550_m5ethernet_converged_network_adapter_xl710-qda2_xl710qda2ethernet_controller_xl710-am2_sr1zkconverged_hx7510_applianceethernet_controller_xl710-bm1_sllkaethernet_converged_network_adapter_xl710-qda1_xl710qda1thinkserver_td350eth_converged_ntwk_adptr_xl710-qda1_exl710qda1g1p5ethernet_converged_network_adapter_x710-da4_x710da4g2p5ethernet_converged_network_adapter_xl710-qda1_xl710qda1g2p5ethernet_converged_network_adapter_xl710-qda2_xl710qda2blkethernet_controller_x710-bm2_sllkbethernet_converged_network_adapter_x710-da2_x710da2blkethernet_controller_xl710-bm2_sllk8thinkserver_rd350thinkserver_rd650ethernet_converged_network_adapter_x710-da4_x710da4fhblkethernet_i\/o_module_xl710-qda1_axx1p40frtiomthinkserver_rd450system_x3650_m5ethernet_10gb_2-port_562flr-sfp\+ethernet_controller_xl710-bm1_sllk9converged_hx7500_applianceethernet_controller_xl710_firmwareethernet_controller_xl710-am2_sr1zlproliant_xl260a_g9_serverthinkserver_sd350ethernet_controller_xl710-bm2_sllk7ethernet_controller_x710-am2_sr1zqconverged_hx_seriessystem_x3500_m5system_x3950_x6ethernet_controller_x710-am2_sr1zpeth_converged_ntwk_adptr_xl710-qda2_exl710qda2g1p5thinkagile_cx4200system_x3850_x6ethernet_converged_network_adapter_xl710-qda2_xl710qda2g2p5ethernet_converged_network_adapter_xl710-qda1_xl710qda1blkethernet_controller_x710_firmwareethernet_controller_xl710-am1_sr1zmeth_converged_ntwk_adptr_x710-da4_ex710da4g1p5thinkagile_cx2200nextscale_nx360_m5converged_hx5500_applianceethernet_controller_x710-bm2_sllkcethernet_converged_network_adapter_x710-da4_x710da4fhg2p5system_x3750_m4converged_hx5510_applianceeth_converged_ntwk_adptr_x710-da2_ex710da2g1p5ethernet_i\/o_module_xl710-qda2_axx2p40frtiomethernet_converged_network_adapter_x710-da4_x710da4fhethernet_converged_network_adapter_x710-da2_x710da2eth_converged_ntwk_adptr_x710-da4_ex710da4fhg1p5ethernet_controller_xl710-am1_sr1znthinkagile_cx4600Intel® Ethernet Controller X710 family and Intel® Ethernet Controller XL710 family
CWE ID-CWE-20
Improper Input Validation
CVE-2022-3429
Matching Score-6
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-6
Assigner-Lenovo Group Ltd.
CVSS Score-6.5||MEDIUM
EPSS-0.08% / 23.25%
||
7 Day CHG~0.00%
Published-27 Oct, 2023 | 18:57
Updated-09 Sep, 2024 | 19:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A denial-of-service vulnerability was found in the firmware used in Lenovo printers, where users send illegal or malformed strings to an open port, triggering a denial of service that causes a display error and prevents the printer from functioning properly.

Action-Not Available
Vendor-Lenovo Group Limited
Product-gm266dns_firmwaregm266dnsg263dns_firmwareg263dnsgm265dngm265dn_firmwarePrinter GM265DN (production date July 2022 and later)Printer GM266DNSPrinter GM265DN (production date June 2022 and before)Printer G263DNS
CWE ID-CWE-20
Improper Input Validation
CVE-2016-4782
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-0.53% / 66.73%
||
7 Day CHG~0.00%
Published-23 May, 2016 | 19:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Lenovo SHAREit before 3.5.98_ww on Android before 4.2 allows remote attackers to have unspecified impact via a crafted intent: URL, aka an "intent scheme URL attack."

Action-Not Available
Vendor-n/aLenovo Group LimitedGoogle LLC
Product-shareitandroidn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2016-3944
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.42% / 61.53%
||
7 Day CHG~0.00%
Published-03 Jun, 2016 | 14:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

UpdateAgent in Lenovo Accelerator Application allows man-in-the-middle attackers to execute arbitrary code by spoofing an update response from susapi.lenovomm.com.

Action-Not Available
Vendor-n/aLenovo Group Limited
Product-accelerator_applicationn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2024-27912
Matching Score-6
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-6
Assigner-Lenovo Group Ltd.
CVSS Score-7.5||HIGH
EPSS-0.07% / 21.01%
||
7 Day CHG~0.00%
Published-05 Apr, 2024 | 20:47
Updated-02 Aug, 2024 | 00:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A denial of service vulnerability was reported in some Lenovo Printers that could allow an attacker to cause the device to crash by sending crafted LPD packets.

Action-Not Available
Vendor-Lenovo Group Limited
Product-Printerslingxlang_g262dn_firmwarelingxlang_g336dn_firmwarelj2310n_firmwarelingxlang_gm337dn_firmwarelingxlang_gm265dn_firmwarelingxlang_lj2320dn_firmware
CWE ID-CWE-20
Improper Input Validation
CVE-2023-5079
Matching Score-6
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-6
Assigner-Lenovo Group Ltd.
CVSS Score-7.5||HIGH
EPSS-0.12% / 31.19%
||
7 Day CHG~0.00%
Published-08 Nov, 2023 | 22:03
Updated-03 Sep, 2024 | 20:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Lenovo LeCloud App improper input validation allows attackers to access arbitrary components and arbitrary file downloads, which could result in information disclosure.

Action-Not Available
Vendor-Lenovo Group Limited
Product-lecloudLeCloud Application
CWE ID-CWE-20
Improper Input Validation
CVE-2020-8349
Matching Score-6
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-6
Assigner-Lenovo Group Ltd.
CVSS Score-9.8||CRITICAL
EPSS-2.62% / 85.34%
||
7 Day CHG~0.00%
Published-14 Oct, 2020 | 21:25
Updated-04 Aug, 2024 | 09:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An internal security review has identified an unauthenticated remote code execution vulnerability in Cloud Networking Operating System (CNOS)’ optional REST API management interface. This interface is disabled by default and not vulnerable unless enabled. When enabled, it is only vulnerable where attached to a VRF and as allowed by defined ACLs. Lenovo strongly recommends upgrading to a non-vulnerable CNOS release. Where not possible, Lenovo recommends disabling the REST API management interface or restricting access to the management VRF and further limiting access to authorized management stations via ACL.

Action-Not Available
Vendor-Lenovo Group Limited
Product-rackswitch_ne1072trackswitch_ne2572rackswitch_ne1032rackswitch_g8296rackswitch_g8272cloud_networking_operating_systemrackswitch_ne0152trackswitch_ne10032rackswitch_g8332rackswitch_ne1032tCloud Networking Operating System (CNOS)
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2024-27909
Matching Score-6
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-6
Assigner-Lenovo Group Ltd.
CVSS Score-4.9||MEDIUM
EPSS-0.05% / 14.98%
||
7 Day CHG~0.00%
Published-05 Apr, 2024 | 20:46
Updated-02 Aug, 2024 | 00:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A denial of service vulnerability was reported in the HTTPS service of some Lenovo Printers that could result in a system reboot.

Action-Not Available
Vendor-Lenovo Group Limited
Product-Printers
CWE ID-CWE-20
Improper Input Validation
CVE-2017-3759
Matching Score-6
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-6
Assigner-Lenovo Group Ltd.
CVSS Score-8.1||HIGH
EPSS-1.43% / 80.30%
||
7 Day CHG~0.00%
Published-17 Oct, 2017 | 20:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Lenovo Service Framework Android application accepts some responses from the server without proper validation. This exposes the application to man-in-the-middle attacks leading to possible remote code execution.

Action-Not Available
Vendor-Lenovo Group Limited
Product-service_frameworkService Framework application
CWE ID-CWE-20
Improper Input Validation
CVE-2017-3752
Matching Score-6
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-6
Assigner-Lenovo Group Ltd.
CVSS Score-8.2||HIGH
EPSS-0.15% / 35.02%
||
7 Day CHG~0.00%
Published-09 Aug, 2017 | 21:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An industry-wide vulnerability has been identified in the implementation of the Open Shortest Path First (OSPF) routing protocol used on some Lenovo switches. Exploitation of these implementation flaws may result in attackers being able to erase or alter the routing tables of one or many routers, switches, or other devices that support OSPF within a routing domain.

Action-Not Available
Vendor-IBM CorporationLenovo Group Limited
Product-g8296_firmwarefabric_en4093\/en4093r_10gb_firmwareg8264t_firmware1g_l2-7_slbrackswitchg8272_firmwareg8264cs_firmwarevirtual_fabric_10gben2092_1gb_firmwareflex_systemg8264_firmwareg8332_firmwarelayer_2\/3_copper_firmwareg8124_firmwaresi4091_firmwareg8316_firmwareg8052_firmwarefabric_en4093r_10gb_firmwarefabric_cn4093_10gb_firmwareg8124e_firmware1\bladecenterLenovo and IBM Switch Products
CWE ID-CWE-20
Improper Input Validation
CVE-2017-3772
Matching Score-6
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-6
Assigner-Lenovo Group Ltd.
CVSS Score-5.5||MEDIUM
EPSS-0.08% / 22.84%
||
7 Day CHG~0.00%
Published-31 Jul, 2024 | 20:30
Updated-01 Aug, 2024 | 15:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability was reported in Lenovo PC Manager versions prior to 2.6.40.3154 that could allow an attacker to cause a system reboot.

Action-Not Available
Vendor-Lenovo Group Limited
Product-PC Manager
CWE ID-CWE-20
Improper Input Validation
CVE-2023-0896
Matching Score-6
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-6
Assigner-Lenovo Group Ltd.
CVSS Score-8.8||HIGH
EPSS-0.10% / 28.60%
||
7 Day CHG~0.00%
Published-01 May, 2023 | 13:52
Updated-30 Jan, 2025 | 15:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A default password was reported in Lenovo Smart Clock Essential with Alexa Built In that could allow unauthorized device access to an attacker with local network access.

Action-Not Available
Vendor-Lenovo Group Limited
Product-smart_clock_essential_with_alexa_built_in_firmwaresmart_clock_essential_with_alexa_built_inLenovo Smart Clock Essential with Alexa Built In
CWE ID-CWE-20
Improper Input Validation
CVE-2023-0683
Matching Score-6
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-6
Assigner-Lenovo Group Ltd.
CVSS Score-8.3||HIGH
EPSS-0.29% / 52.33%
||
7 Day CHG~0.00%
Published-01 May, 2023 | 14:23
Updated-30 Jan, 2025 | 15:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A valid, authenticated XCC user with read only access may gain elevated privileges through a specifically crafted API call.

Action-Not Available
Vendor-Lenovo Group Limited
Product-thinksystem_sn550thinksystem_sr530_firmwarethinkagile_hx3375_firmwarethinksystem_sr570_firmwarethinkagile_hx5530thinksystem_sr158thinkagile_hx3721thinksystem_sd630_v2_firmwarethinksystem_sr665_firmwarethinksystem_sd650thinkagile_hx3520-g_firmwarethinkagile_hx3521-g_firmwarethinkagile_mx3531_h_firmwarethinksystem_st250thinkagile_vx1320_firmwarethinksystem_sr850thinksystem_sr158_firmwarethinkagile_vx3320_firmwarethinkagile_hx7530_firmwarethinkagile_hx2330thinkagile_vx7820thinksystem_sn850thinkagile_hx5520thinkagile_vx7530_firmwarethinkedge_se450_thinkagile_vx3320thinkagile_vx5520_firmwarethinksystem_st550_firmwarethinksystem_sr630thinkagile_mx1021_on_se350_firmwarethinksystem_sr950thinkagile_vx7320_nthinksystem_st658_v2thinkagile_hx1521-r_firmwarethinkagile_hx7820thinkagile_vx2320thinkagile_vx7520_nthinkagile_hx7520_firmwarethinkagile_vx_2u4nthinksystem_sr860_firmwarethinksystem_sr650_v2_firmwarethinkagile_hx5520-cthinksystem_sr630_v2thinkagile_hx_enclosure_firmwarethinkagile_hx7820_firmwarethinkagile_hx3720thinksystem_sd530thinksystem_sr860_v2thinksystem_sn850_firmwarethinkagile_mx1021_on_se350thinkagile_vx_4u_firmwarethinksystem_st650_v2thinksystem_sr258_v2thinkagile_hx7521_firmwarethinkagile_hx1021thinkagile_hx3375thinkagile_vx2320_firmwarethinksystem_sr250_v2_firmwarethinkagile_vx3330thinkagile_mx3330-h_firmwarethinkagile_hx2720-e_firmwarethinkagile_hx3331_firmwarethinksystem_st250_firmwarethinksystem_sr645_v3thinkagile_hx3330_firmwarethinksystem_sr570thinksystem_sd650-n_v2thinkagile_vx7520thinkagile_hx3321_firmwarethinksystem_sr670_v2_firmwarethinksystem_sr670_v2thinkagile_vx_4uthinkagile_mx3331-f_firmwarethinkagile_hx2320-e_firmwarethinkagile_hx1331thinkagile_hx3331thinkagile_hx7521thinkagile_vx5520thinksystem_sr550thinkagile_mx3330-hthinkagile_vx7530thinkagile_vx3520-g_firmwarethinksystem_se350_firmwarethinkagile_mx3530-hthinksystem_sd650_firmwarethinksystem_st250_v2thinkagile_hx2321_firmwarethinkagile_hx2321thinkagile_hx3721_firmwarethinkagile_mx3330-f_firmwarethinksystem_sr860_v2_firmwarethinksystem_sr850p_firmwarethinksystem_st258thinkagile_hx1320thinkagile_hx1321_firmwarethinksystem_sr850pthinkagile_hx1320_firmwarethinksystem_sn550_v2thinkstation_p920_firmwarethinksystem_sr258_v2_firmwarethinkagile_hx3320_firmwarethinkagile_hx3521-gthinkagile_hx2331_firmwarethinkagile_mx3530_f_firmwarethinksystem_st650_v2_firmwarethinkagile_mx3330-fthinksystem_st258_v2_firmwarethinksystem_st258_firmwarethinkagile_hx3376_firmwarethinkagile_vx2330thinkagile_vx7330_firmwarethinkagile_vx7531_firmwarethinkagile_hx7821_firmwarethinksystem_sr850_firmwarethinkagile_vx3330_firmwarethinksystem_st550thinkagile_hx7531thinkagile_vx3520-gthinksystem_st658_v2_firmwarethinkagile_vx7531thinkagile_vx_2u4n_firmwarethinksystem_sr670_firmwarethinksystem_sr150thinkagile_vx3720thinksystem_sr850_v2_firmwarethinksystem_sr250_v2thinkagile_hx2330_firmwarethinksystem_sd650_v2_firmwarethinksystem_sr665_v3_firmwarethinkagile_mx3530-h_firmwarethinkagile_hx_enclosurethinkagile_hx1321thinksystem_st250_v2_firmwarethinkagile_hx7520thinkagile_hx3330thinkagile_mx3331-h_firmwarethinkedge_se450__firmwarethinksystem_sr645_v3_firmwarethinkagile_hx2720-ethinkagile_hx1331_firmwarethinksystem_sr650_firmwarethinksystem_sd650-n_v2_firmwarethinksystem_sn550_v2_firmwarethinkagile_hx3321thinkagile_hx7530thinksystem_sr250thinksystem_sr530thinkagile_hx5520_firmwarethinksystem_sr850_v2thinksystem_se350thinkagile_mx1020_firmwarethinkagile_mx1020thinksystem_sr665thinksystem_sr150_firmwarethinkagile_hx3520-gthinkagile_vx7320_n_firmwarethinksystem_sr860thinkagile_hx7821thinkagile_hx3720_firmwarethinkagile_hx5521_firmwarethinksystem_sr645_firmwarethinkagile_hx1021_firmwarethinkagile_hx5530_firmwarethinkagile_vx3331thinksystem_st258_v2thinkagile_vx7820_firmwarethinkagile_hx5520-c_firmwarethinksystem_sd530_firmwarethinkagile_vx_1sethinkagile_mx3331-hthinkagile_hx5521-c_firmwarethinksystem_sd650_v2thinkstation_p920thinksystem_sr650_v2thinkagile_vx7330thinksystem_sn550_firmwarethinkagile_hx5521-cthinksystem_sr250_firmwarethinksystem_sr258_firmwarethinksystem_sr590_firmwarethinkagile_mx3530_fthinkagile_hx1520-rthinksystem_sd630_v2thinkagile_hx1521-rthinkagile_hx1520-r_firmwarethinkagile_hx3320thinkagile_vx3720_firmwarethinkagile_hx5531thinkagile_vx_1se_firmwarethinksystem_sr630_firmwarethinkagile_vx7520_n_firmwarethinksystem_sr550_firmwarethinkagile_hx2331thinkagile_hx2320-ethinkagile_vx5530thinkagile_mx3331-fthinkagile_hx7531_firmwarethinkagile_vx1320thinksystem_sr645thinksystem_sr670thinksystem_sr590thinkagile_vx3331_firmwarethinkagile_vx7520_firmwarethinksystem_sr950_firmwarethinkagile_vx2330_firmwarethinkagile_vx3530-g_firmwarethinksystem_sr630_v2_firmwarethinksystem_sr665_v3thinkagile_hx3376thinkagile_hx5531_firmwarethinkagile_mx3531_hthinkagile_vx3530-gthinkagile_vx5530_firmwarethinksystem_sr650thinksystem_sr258thinkagile_hx5521thinkagile_mx3531-fthinkagile_mx3531-f_firmwareXClarity Controller
CWE ID-CWE-20
Improper Input Validation
CVE-2021-3786
Matching Score-6
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-6
Assigner-Lenovo Group Ltd.
CVSS Score-4.4||MEDIUM
EPSS-0.04% / 13.17%
||
7 Day CHG~0.00%
Published-12 Nov, 2021 | 22:05
Updated-03 Aug, 2024 | 17:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A potential vulnerability in the SMI callback function used in CSME configuration of some Lenovo Notebook and ThinkPad systems could be used to leak out data out of the SMRAM range.

Action-Not Available
Vendor-Lenovo Group Limited
Product-thinkpad_t14sthinkpad_x13_yoga_gen_1thinkpad_l460_firmwarethinkpad_p17_gen_1thinkpad_11e_4th_gen_firmwarethinkpad_e490thinkpad_x1_fold_gen_1thinkpad_p51sthinkpad_p53thinkpad_x1_carbon_3rd_genthinkpad_p72_firmwarethinkpad_x12_detachable_gen_1_firmwarethinkpad_l590thinkpad_l460thinkpad_p52thinkpad_l13_yoga_gen_2_firmwarethinkpad_p70thinkpad_13_gen_2thinkpad_e470_firmwarethinkpad_x1_carbon_gen_8thinkpad_t460pthinkpad_p1thinkpad_e15_firmwarethinkpad_x1_tablet_firmwarethinkpad_t14s_firmwarethinkpad_l380_yoga_firmwarethinkpad_x280thinkpad_x390thinkpad_s540thinkpad_t15g_gen_1thinkpad_l470_firmwareideapad_yoga_s940-14iwlthinkpad_x1_carbon_3rd_gen_firmwarethinkpad_t490_firmwarethinkpad_l380_firmwarethinkpad_t15_firmwarethinkpad_t560_firmwarethinkpad_t580thinkpad_l390_yogathinkpad_t15p_gen_1_firmwarethinkpad_s5_2nd_gen_firmwarethinkpad_x1_carbon_gen_6_firmwarethinkpad_t570_firmwarethinkpad_yoga_11e_5th_genthinkpad_x1_carbon_5th_gen_kabylakethinkpad_t15p_gen_1thinkpad_x1_extreme_gen_3thinkpad_l570_firmwarethinkpad_x380_yoga_firmwarev330-15iskthinkpad_l13_yogathinkpad_11e_yoga_gen_6_firmwarethinkpad_s540_firmwarethinkpad_x1_yoga_4th_genthinkpad_t15g_gen_1_firmwarethinkpad_p52_firmwarethinkpad_x1_carbon_gen_6thinkpad_t580_firmwarethinkpad_e15v130-15igm_firmwarethinkpad_e15_gen_3_firmwarethinkpad_e14_gen_3_firmwarethinkpad_t460sthinkpad_11e_3rd_genthinkpad_x390_yogathinkpad_e570thinkpad_x1_carbon_gen_8_firmwarethinkpad_s5_2nd_genthinkpad_p14s_gen_1thinkpad_x1_yoga_3rd_gen_firmwarethinkpad_x1_extreme_firmwarethinkpad_11e_4th_genthinkpad_x13_gen_1_firmwarethinkpad_25_firmwarethinkpad_yoga_11e_5th_gen_firmwarethinkpad_e580thinkpad_p1_gen_3thinkpad_l13_gen_2thinkpad_x1_tablet_gen_3_firmwarethinkpad_p71thinkpad_x1_titanium_firmwarethinkpad_10_firmwarethinkpad_t14s_gen_2_firmwarethinkpad_e480_firmwarethinkpad_p51s_firmwarethinkpad_x250thinkpad_x1_carbon_gen_7ideapad_s940-14iwlthinkpad_t460_firmwarethinkpad_t460s_firmwarethinkpad_p15s_gen_2_firmwarethinkpad_x270_firmwarethinkpad_x1_carbon_5th_gen_skylake_firmwarethinkpad_s2_yoga_gen_6_firmwarethinkpad_x12_detachable_gen_1thinkpad_p1_gen_3_firmwarethinkpad_helix_firmwarethinkpad_l490thinkpad_t480s_firmwarethinkpad_p71_firmwarethinkpad_x1_carbon_5th_gen_skylakethinkpad_x1_tablet_gen_3thinkpad_l590_firmwarethinkpad_e15_gen_2_firmwarethinkpad_e15_gen_2thinkpad_l15thinkpad_t15_gen_2thinkpad_x1_titaniumthinkpad_l560_firmwarethinkpad_x260thinkpad_x1_nano_gen_1_firmwarethinkpad_11e_3rd_gen_firmwarethinkpad_p14s_gen_2thinkpad_e15_gen_3thinkpad_x250_firmwarethinkpad_p15v_gen_1_firmwarethinkpad_p53s_firmwarethinkpad_p15_gen_1v130-15igmthinkpad_x1_extreme_2ndthinkpad_t470_firmwarethinkpad_p52sthinkpad_13_gen_2_firmwarethinkpad_l13_yoga_firmwarethinkpad_t480_firmwarethinkpad_p50_firmwarethinkpad_25thinkpad_e580_firmwarethinkpad_x260_firmwarethinkpad_e590_firmwarethinkpad_t570thinkpad_l560thinkpad_t490thinkpad_x280_firmwarethinkpad_x1_yoga_1st_gen_firmwarethinkpad_t590thinkpad_t550thinkpad_p73_firmwarethinkpad_x1_tabletthinkpad_x1_carbon_5th_gen_kabylake_firmwarethinkpad_w550sthinkpad_l480thinkpad_x1_carbon_gen_7_firmwarethinkpad_t460thinkpad_x390_firmwarethinkpad_l390_yoga_firmwarethinkpad_s2_yoga_gen_6thinkpad_x270thinkpad_x1_yoga_gen_5_firmwarethinkpad_l580_firmwarethinkpad_t14_gen_2_firmwarethinkpad_e14_gen_2thinkpad_10ideapad_s940-14iwl_firmwarethinkpad_p50s_firmwarethinkpad_yoga_370thinkpad_p15s_gen_1_firmwarethinkpad_x13_yoga_gen_1_firmwarethinkpad_t440p_firmwarethinkpad_l470thinkpad_e570_firmwarethinkpad_t440pthinkpad_yoga_15thinkpad_l15_gen_2thinkpad_x390_yoga_firmwarethinkpad_p15v_gen_1thinkpad_l380thinkpad_t590_firmwarethinkpad_yoga_11e_4th_gen_firmwarethinkpad_x1_extremethinkpad_l490_firmwarethinkpad_yoga_11e_3rd_gen_firmwarethinkpad_x1_tablet_gen_2_firmwarethinkpad_p1_gen_2_firmwarethinkpad_t460p_firmwarethinkpad_l13_firmwarethinkpad_p52s_firmwarethinkpad_x13_gen_2thinkpad_l15_gen_2_firmwarethinkpad_x1_carbon_4th_gen_firmwarethinkpad_t550_firmwarethinkpad_l13_gen_2_firmwarethinkpad_e590thinkpad_x1_yoga_3rd_genthinkpad_e14_gen_3thinkpad_x13_gen_1thinkpad_s2_gen_6thinkpad_x1_nano_gen_1thinkpad_p1_firmwarethinkpad_t15thinkpad_p15_gen_1_firmwarethinkpad_p14s_gen_2_firmwarethinkpad_p15s_gen_1v330-15ikb_firmwarethinkpad_t14s_gen_2thinkpad_x1_yoga_gen_5thinkpad_x380_yogathinkpad_l480_firmwarethinkpad_p53sthinkpad_t480sthinkpad_x13_yoga_gen_2thinkpad_x1_extreme_2nd_firmwarethinkpad_p51_firmwarethinkpad_e14ideapad_yoga_s940-14iwl_firmwarethinkpad_l13_yoga_gen_2thinkpad_l570thinkpad_x1_yoga_4th_gen_firmwarethinkpad_p43sthinkpad_l390_firmwarethinkpad_t490s_firmwarethinkpad_l14_firmwarethinkpad_t14_gen_2thinkpad_x1_extreme_gen_3_firmwarethinkpad_t470s_firmwarethinkpad_p14s_gen_1_firmwarethinkpad_l580thinkpad_p50thinkpad_x1_tablet_gen_2v330-15ikbthinkpad_s2_gen_6_firmwarethinkpad_x13_yoga_gen_2_firmwarethinkpad_p1_gen_2thinkpad_t470p_firmwarethinkpad_11e_yoga_gen_6thinkpad_x13_gen_2_firmwarethinkpad_e490_firmwarethinkpad_p70_firmwarethinkpad_t560thinkpad_e14_gen_2_firmwarethinkpad_t470thinkpad_x1_carbon_4th_genthinkpad_p17_gen_1_firmwarethinkpad_yoga_11e_3rd_genthinkpad_l390thinkpad_t15_gen_2_firmwarethinkpad_p53_firmwarethinkpad_p50sthinkpad_x1_yoga_1st_genv330-15isk_firmwarethinkpad_l15_firmwarethinkpad_e480thinkpad_yoga_260thinkpad_p51thinkpad_l380_yogathinkpad_x1_fold_gen_1_firmwarethinkpad_l14thinkpad_l13thinkpad_t490sthinkpad_p73thinkpad_e470thinkpad_yoga_11e_4th_genthinkpad_yoga_15_firmwarethinkpad_t470sthinkpad_p72thinkpad_t14_gen_1thinkpad_yoga_260_firmwarethinkpad_t470pthinkpad_helixthinkpad_t14_gen_1_firmwarethinkpad_w550s_firmwarethinkpad_e14_firmwarethinkpad_yoga_370_firmwarethinkpad_p15s_gen_2thinkpad_t480thinkpad_p43s_firmwareNotebook and ThinkPad BIOS
CWE ID-CWE-20
Improper Input Validation
CVE-2023-34422
Matching Score-6
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-6
Assigner-Lenovo Group Ltd.
CVSS Score-6.5||MEDIUM
EPSS-0.10% / 26.73%
||
7 Day CHG~0.00%
Published-26 Jun, 2023 | 19:45
Updated-06 Nov, 2024 | 21:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A valid, authenticated LXCA user with elevated privileges may be able to delete folders in the LXCA filesystem through a specifically crafted web API call due to insufficient input validation.

Action-Not Available
Vendor-Lenovo Group Limited
Product-xclarity_administratorLenovo XClarity Administrator
CWE ID-CWE-20
Improper Input Validation
CVE-2023-34421
Matching Score-6
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-6
Assigner-Lenovo Group Ltd.
CVSS Score-6.5||MEDIUM
EPSS-0.10% / 26.73%
||
7 Day CHG~0.00%
Published-26 Jun, 2023 | 19:45
Updated-06 Nov, 2024 | 21:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A valid, authenticated LXCA user with elevated privileges may be able to replace filesystem data through a specifically crafted web API call due to insufficient input validation.

Action-Not Available
Vendor-Lenovo Group Limited
Product-xclarity_administratorLenovo XClarity Administrator
CWE ID-CWE-20
Improper Input Validation
CVE-2018-9072
Matching Score-6
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-6
Assigner-Lenovo Group Ltd.
CVSS Score-6.5||MEDIUM
EPSS-0.31% / 53.81%
||
7 Day CHG~0.00%
Published-30 Nov, 2018 | 14:00
Updated-05 Aug, 2024 | 07:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
LXCI for VMware

In versions prior to 5.5, LXCI for VMware allows an authenticated user to download any system file due to insufficient input sanitization during file downloads.

Action-Not Available
Vendor-Lenovo Group Limited
Product-xclarity_integratorLXCI for VMware
CWE ID-CWE-20
Improper Input Validation
CVE-2018-9066
Matching Score-6
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-6
Assigner-Lenovo Group Ltd.
CVSS Score-8.8||HIGH
EPSS-0.67% / 70.82%
||
7 Day CHG-0.04%
Published-30 Jul, 2018 | 15:00
Updated-16 Sep, 2024 | 17:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Lenovo xClarity Administrator versions earlier than 2.1.0, an authenticated LXCA user can, under specific circumstances, inject additional parameters into a specific web API call which can result in privileged command execution within LXCA's underlying operating system.

Action-Not Available
Vendor-Lenovo Group Limited
Product-xclarity_administratorLenovo xClarity Administrator
CWE ID-CWE-20
Improper Input Validation
CVE-2023-1577
Matching Score-6
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-6
Assigner-Lenovo Group Ltd.
CVSS Score-7.8||HIGH
EPSS-0.09% / 25.59%
||
7 Day CHG~0.00%
Published-31 Jul, 2024 | 20:29
Updated-01 Aug, 2024 | 19:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A path hijacking vulnerability was reported in Lenovo Driver Manager prior to version 3.1.1307.1308 that could allow a local user to execute code with elevated privileges.

Action-Not Available
Vendor-Lenovo Group Limited
Product-Driver Managerdrivers_management
CWE ID-CWE-20
Improper Input Validation
CVE-2020-8324
Matching Score-6
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-6
Assigner-Lenovo Group Ltd.
CVSS Score-5||MEDIUM
EPSS-0.06% / 19.23%
||
7 Day CHG~0.00%
Published-14 Apr, 2020 | 21:05
Updated-16 Sep, 2024 | 18:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability was reported in LenovoAppScenarioPluginSystem for Lenovo System Interface Foundation prior to version 1.2.184.31 that could allow unsigned DLL files to be executed.

Action-Not Available
Vendor-Lenovo Group Limited
Product-system_interface_foundationLenovoAppScenarioPluginSystem for Lenovo System Interface Foundation
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CWE ID-CWE-20
Improper Input Validation
CVE-2018-4054
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-9||CRITICAL
EPSS-0.05% / 14.13%
||
7 Day CHG~0.00%
Published-08 Mar, 2019 | 20:00
Updated-16 Sep, 2024 | 17:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A local privilege escalation vulnerability exists in the install helper tool of the Mac OS X version of Pixar Renderman, version 22.2.0. A user with local access can use this vulnerability to escalate their privileges to root. An attacker would need local access to the machine to successfully exploit this flaw.

Action-Not Available
Vendor-pixarTalos (Cisco Systems, Inc.)
Product-rendermanPixar Renderman
CWE ID-CWE-20
Improper Input Validation
CVE-2009-0083
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.2||HIGH
EPSS-1.16% / 78.21%
||
7 Day CHG~0.00%
Published-10 Mar, 2009 | 20:00
Updated-07 Aug, 2024 | 04:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 does not properly handle invalid pointers, which allows local users to gain privileges via an application that triggers use of a crafted pointer, aka "Windows Kernel Invalid Pointer Vulnerability."

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-windows_vistawindows_2000windows_xpwindows_server_2003windows_server_2008n/a
CWE ID-CWE-20
Improper Input Validation
CVE-2009-0029
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.2||HIGH
EPSS-0.04% / 13.13%
||
7 Day CHG~0.00%
Published-15 Jan, 2009 | 17:00
Updated-07 Aug, 2024 | 04:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The ABI in the Linux kernel 2.6.28 and earlier on s390, powerpc, sparc64, and mips 64-bit platforms requires that a 32-bit argument in a 64-bit register was properly sign extended when sent from a user-mode application, but cannot verify this, which allows local users to cause a denial of service (crash) or possibly gain privileges via a crafted system call.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncDebian GNU/Linux
Product-debian_linuxlinux_kerneln/a
CWE ID-CWE-20
Improper Input Validation
CVE-2009-0082
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-1.02% / 76.87%
||
7 Day CHG~0.00%
Published-10 Mar, 2009 | 20:00
Updated-21 Jan, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 does not properly validate handles, which allows local users to gain privileges via a crafted application that triggers unspecified "actions," aka "Windows Kernel Handle Validation Vulnerability."

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-windows_server_2003windows_vistawindows_server_2008windows_xpwindows_2000n/a
CWE ID-CWE-20
Improper Input Validation
CVE-2008-6962
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.05% / 15.18%
||
7 Day CHG~0.00%
Published-13 Aug, 2009 | 16:00
Updated-07 Aug, 2024 | 11:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Avira AntiVir Premium, Premium Security Suite, AntiVir Professional, and AntiVir Personal - FREE allows local users to execute arbitrary code via a crafted IOCTL request that overwrites a kernel pointer.

Action-Not Available
Vendor-aviran/a
Product-antivir_professionalantivir_personalantivir_security_suiteantivirn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2008-7107
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.30% / 52.86%
||
7 Day CHG~0.00%
Published-28 Aug, 2009 | 15:00
Updated-07 Aug, 2024 | 11:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

easdrv.sys in ESET Smart Security 3.0.667.0 allows local users to cause a denial of service (crash) via a crafted IOCTL 0x222003 request to the \\.\easdrv device interface.

Action-Not Available
Vendor-n/aESET, spol. s r. o.
Product-smart_securityn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2008-6559
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.45% / 62.94%
||
7 Day CHG~0.00%
Published-30 Mar, 2009 | 20:00
Updated-07 Aug, 2024 | 11:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Merge mcd in ReliantHA 1.1.4 in SCO UnixWare 7.1.4 allows local users to gain root privileges via a crafted -d argument that contains .. (dot dot) sequences that point to a directory containing a file whose name includes shell metacharacters.

Action-Not Available
Vendor-scon/a
Product-unixwarerelianthan/a
CWE ID-CWE-20
Improper Input Validation
CVE-2018-4006
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-9.3||CRITICAL
EPSS-0.04% / 11.33%
||
7 Day CHG~0.00%
Published-17 Apr, 2019 | 14:35
Updated-05 Aug, 2024 | 04:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An exploitable privilege escalation vulnerability exists in the Shimo VPN 4.1.5.1 helper service in the writeConfig functionality. A non-root user is able to write a file anywhere on the system. A user with local access can use this vulnerability to raise their privileges to root. An attacker would need local access to the machine to exploit it successfully.

Action-Not Available
Vendor-shimovpnn/a
Product-shimo_vpnShimo VPN
CWE ID-CWE-20
Improper Input Validation
CVE-2021-33059
Matching Score-4
Assigner-Intel Corporation
ShareView Details
Matching Score-4
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 17.27%
||
7 Day CHG~0.00%
Published-17 Nov, 2021 | 19:13
Updated-03 Aug, 2024 | 23:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in the Intel(R) Administrative Tools for Intel(R) Network Adapters driver for Windows before version 1.4.0.15, may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-administrative_tools_for_intel_network_adaptersIntel(R) Administrative Tools for Intel(R) Network Adapters
CWE ID-CWE-20
Improper Input Validation
CVE-2018-3612
Matching Score-4
Assigner-Intel Corporation
ShareView Details
Matching Score-4
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 11.71%
||
7 Day CHG~0.00%
Published-10 May, 2018 | 22:00
Updated-05 Aug, 2024 | 04:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Intel NUC kits with insufficient input validation in system firmware, potentially allows a local attacker to elevate privileges to System Management Mode (SMM).

Action-Not Available
Vendor-n/aIntel Corporation
Product-dnkbli30.86agkaplcpx.86arybdwi35.86aayaplcel.86akyskli70.86abnkbl357.86afybyt10h.86asyskli35.86amybdwi30.86accsklm30.86amkkbly35.86adnkbli5v.86amkkbli5v.86abiosccsklm5v.86amybdwi5v.86atybyt10h.86adnkbli7v.86an/a
CWE ID-CWE-20
Improper Input Validation
CVE-2008-6558
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.33% / 55.49%
||
7 Day CHG~0.00%
Published-30 Mar, 2009 | 20:00
Updated-07 Aug, 2024 | 11:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Untrusted search path vulnerability in (1) hvdisp and (2) rcvm in ReliantHA 1.1.4 in SCO UnixWare 7.1.4 allows local users to gain root privileges by modifying the RELIANT_PATH environment variable to point to a malicious bin/hvenv program.

Action-Not Available
Vendor-scounixwaren/a
Product-unixwarerelianthan/a
CWE ID-CWE-20
Improper Input Validation
CVE-2017-14961
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.39% / 59.55%
||
7 Day CHG~0.00%
Published-15 Nov, 2017 | 16:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In IKARUS anti.virus 2.16.7, the ntguard.sys driver contains an Arbitrary Write vulnerability because of not validating input values from IOCtl 0x8300000c.

Action-Not Available
Vendor-ikarussecurityn/a
Product-anti.virusn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2018-20669
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.09% / 24.87%
||
7 Day CHG~0.00%
Published-18 Mar, 2019 | 16:33
Updated-05 Aug, 2024 | 12:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue where a provided address with access_ok() is not checked was discovered in i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Linux kernel through 4.19.13. A local attacker can craft a malicious IOCTL function call to overwrite arbitrary kernel memory, resulting in a Denial of Service or privilege escalation.

Action-Not Available
Vendor-n/aNetApp, Inc.Linux Kernel Organization, IncCanonical Ltd.
Product-ubuntu_linuxlinux_kernelcn1610hci_management_nodecn1610_firmwaresnapprotectsolidfiren/a
CWE ID-CWE-20
Improper Input Validation
CVE-2018-20869
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.07% / 20.13%
||
7 Day CHG~0.00%
Published-30 Jul, 2019 | 14:27
Updated-05 Aug, 2024 | 12:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

cPanel before 76.0.8 allows arbitrary code execution in the context of the root account via dnssec adminbin (SEC-465).

Action-Not Available
Vendor-n/acPanel (WebPros International, LLC)
Product-cpaneln/a
CWE ID-CWE-20
Improper Input Validation
CVE-2008-3838
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.06% / 17.29%
||
7 Day CHG~0.00%
Published-27 Aug, 2008 | 20:00
Updated-07 Aug, 2024 | 09:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in the NFS Remote Procedure Calls (RPC) zones implementation in Sun Solaris 10 and OpenSolaris before snv_88 allows local administrators of non-global zones to read and modify NFS traffic for arbitrary non-global zones, possibly leading to file modifications or a denial of service.

Action-Not Available
Vendor-n/aSun Microsystems (Oracle Corporation)
Product-opensolarissolarisn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2021-33108
Matching Score-4
Assigner-Intel Corporation
ShareView Details
Matching Score-4
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.06% / 17.27%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 16:35
Updated-05 May, 2025 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation in the Intel(R) In-Band Manageability software before version 2.13.0 may allow a privileged user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-in-band_manageabilityIntel(R) In-Band Manageability software
CWE ID-CWE-20
Improper Input Validation
CVE-2018-19636
Matching Score-4
Assigner-OpenText (formerly Micro Focus)
ShareView Details
Matching Score-4
Assigner-OpenText (formerly Micro Focus)
CVSS Score-7.3||HIGH
EPSS-0.04% / 11.81%
||
7 Day CHG~0.00%
Published-05 Mar, 2019 | 16:00
Updated-17 Sep, 2024 | 04:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Local root exploit via inclusion of attacker controlled shell script

Supportutils, before version 3.1-5.7.1, when run with command line argument -A searched the file system for a ndspath binary. If an attacker provides one at an arbitrary location it is executed with root privileges

Action-Not Available
Vendor-openSUSESUSE
Product-supportutilssupportutils
CWE ID-CWE-306
Missing Authentication for Critical Function
CWE ID-CWE-20
Improper Input Validation
CVE-2018-19295
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.12% / 31.06%
||
7 Day CHG~0.00%
Published-17 Dec, 2018 | 15:00
Updated-05 Aug, 2024 | 11:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Sylabs Singularity 2.4 to 2.6 allows local users to conduct Improper Input Validation attacks.

Action-Not Available
Vendor-sylabsn/a
Product-singularityn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2008-4363
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.85% / 74.41%
||
7 Day CHG~0.00%
Published-30 Sep, 2008 | 21:00
Updated-07 Aug, 2024 | 10:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

DLMFENC.sys 1.0.0.28 in DESlock+ 3.2.7 allows local users to cause a denial of service (system crash) or potentially execute arbitrary code via a certain DLMFENC_IOCTL request to \\.\DLKPFSD_Device that overwrites a pointer, probably related to use of the ProbeForRead function when ProbeForWrite was intended.

Action-Not Available
Vendor-deslockn/a
Product-deslockn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2013-0292
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.2||HIGH
EPSS-0.27% / 49.68%
||
7 Day CHG~0.00%
Published-04 Mar, 2013 | 21:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal.

Action-Not Available
Vendor-n/afreedesktop.org
Product-dbus-glibn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2008-2926
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.2||HIGH
EPSS-0.06% / 17.67%
||
7 Day CHG~0.00%
Published-12 Aug, 2008 | 23:00
Updated-07 Aug, 2024 | 09:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The kmxfw.sys driver in CA Host-Based Intrusion Prevention System (HIPS) r8, as used in CA Internet Security Suite and Personal Firewall, does not properly verify IOCTL requests, which allows local users to cause a denial of service (system crash) or possibly gain privileges via a crafted request.

Action-Not Available
Vendor-n/aBroadcom Inc.
Product-host_based_intrusion_prevention_systempersonal_firewall_2008personal_firewall_2007internet_security_suite_2008internet_security_suiten/a
CWE ID-CWE-20
Improper Input Validation
CVE-2013-0078
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.2||HIGH
EPSS-0.87% / 74.80%
||
7 Day CHG~0.00%
Published-09 Apr, 2013 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Microsoft Antimalware Client in Windows Defender on Windows 8 and Windows RT uses an incorrect pathname for MsMpEng.exe, which allows local users to gain privileges via a crafted application, aka "Microsoft Antimalware Improper Pathname Vulnerability."

Action-Not Available
Vendor-n/aMicrosoft Corporation
Product-windows_defenderwindows_rtwindows_8n/a
CWE ID-CWE-20
Improper Input Validation
CVE-2021-32471
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-5.43% / 89.95%
||
7 Day CHG~0.00%
Published-10 May, 2021 | 04:49
Updated-03 Aug, 2024 | 23:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation in the Marvin Minsky 1967 implementation of the Universal Turing Machine allows program users to execute arbitrary code via crafted data. For example, a tape head may have an unexpected location after the processing of input composed of As and Bs (instead of 0s and 1s). NOTE: the discoverer states "this vulnerability has no real-world implications."

Action-Not Available
Vendor-n/aMIT (Massachusetts Institute of Technology)
Product-universal_turing_machinen/a
CWE ID-CWE-20
Improper Input Validation
  • Previous
  • 1
  • 2
  • 3
  • 4
  • ...
  • 12
  • 13
  • Next
Details not found