Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2025-4371

Summary
Assigner-lenovo
Assigner Org ID-da227ddf-6e25-4b41-b023-0f976dcaca4b
Published At-18 Aug, 2025 | 20:04
Updated At-19 Aug, 2025 | 13:01
Rejected At-
Credits

A potential vulnerability was reported in the Lenovo 510 FHD and Performance FHD web cameras that could allow an attacker with physical access to write arbitrary firmware updates to the device over a USB connection.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:lenovo
Assigner Org ID:da227ddf-6e25-4b41-b023-0f976dcaca4b
Published At:18 Aug, 2025 | 20:04
Updated At:19 Aug, 2025 | 13:01
Rejected At:
▼CVE Numbering Authority (CNA)

A potential vulnerability was reported in the Lenovo 510 FHD and Performance FHD web cameras that could allow an attacker with physical access to write arbitrary firmware updates to the device over a USB connection.

Affected Products
Vendor
Lenovo Group LimitedLenovo
Product
510 FHD Webcam
Default Status
unaffected
Versions
Affected
  • From 0 before 4.8.0 (custom)
Vendor
Lenovo Group LimitedLenovo
Product
Performance FHD Webcam
Default Status
unaffected
Versions
Affected
  • From 0 before 4.8.0 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-347CWE-347: Improper Verification of Cryptographic Signature
Type: CWE
CWE ID: CWE-347
Description: CWE-347: Improper Verification of Cryptographic Signature
Metrics
VersionBase scoreBase severityVector
4.07.0HIGH
CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
3.16.8MEDIUM
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Version: 4.0
Base score: 7.0
Base severity: HIGH
Vector:
CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Version: 3.1
Base score: 6.8
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Update your web camera by downloading and running version 4.8.0 of the firmware update tool: https://support.lenovo.com/us/en/accessories/acc500235-lenovo-510-fhd-webcam-overview-and-service-parts

Configurations

Workarounds

Exploits

Credits

finder
Lenovo thanks Mickey Shkatov and Jesse Michael of Eclypsium for reporting this issue.
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://support.lenovo.com/us/en/product_security/LEN-194466
N/A
Hyperlink: https://support.lenovo.com/us/en/product_security/LEN-194466
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:psirt@lenovo.com
Published At:18 Aug, 2025 | 20:15
Updated At:18 Aug, 2025 | 20:16

A potential vulnerability was reported in the Lenovo 510 FHD and Performance FHD web cameras that could allow an attacker with physical access to write arbitrary firmware updates to the device over a USB connection.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.07.0HIGH
CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Primary3.16.8MEDIUM
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 4.0
Base score: 7.0
Base severity: HIGH
Vector:
CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Primary
Version: 3.1
Base score: 6.8
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-347Secondarypsirt@lenovo.com
CWE ID: CWE-347
Type: Secondary
Source: psirt@lenovo.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://support.lenovo.com/us/en/product_security/LEN-194466psirt@lenovo.com
N/A
Hyperlink: https://support.lenovo.com/us/en/product_security/LEN-194466
Source: psirt@lenovo.com
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

24Records found

CVE-2021-3615
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-6.6||MEDIUM
EPSS-0.06% / 17.61%
||
7 Day CHG~0.00%
Published-17 Aug, 2021 | 16:25
Updated-03 Aug, 2024 | 17:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability was reported in Lenovo Smart Camera X3, X5, and C2E that could allow code execution if a specific file exists on the attached SD card. This vulnerability is the same as CNVD-2021-45262.

Action-Not Available
Vendor-Lenovo Group Limited
Product-smart_camera_x5_firmwaresmart_camera_x5smart_camera_x3_firmwaresmart_camera_x3smart_camera_c2esmart_camera_c2e_firmwareSmart Camera X3, X5, and C2E firmware
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CVE-2021-3519
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-6.4||MEDIUM
EPSS-0.03% / 8.15%
||
7 Day CHG~0.00%
Published-12 Nov, 2021 | 22:05
Updated-03 Aug, 2024 | 17:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability was reported in some Lenovo Desktop models that could allow unauthorized access to the boot menu, when the "BIOS Password At Boot Device List" BIOS setting is Yes.

Action-Not Available
Vendor-Microsoft CorporationLenovo Group Limited
Product-v530-15arr_firmwarethinkcentre_m70q_firmwarethinkstation_p520_firmwarethinkcentre_m80sthinkcentre_m75s_gen_2_firmwarethinkcentre_qt_m415_firmwarethinkcentre_e75_t\/sthinkcentre_m80q_firmwarethinkcentre_m720ethinkcentre_m90s_firmwarethinkcentre_m630e_firmwarethinkcentre_m70s_firmwareideacentre_510s-07icbthinkcentre_e75_t\/s_firmwarethinkcentre_m90q_tiny_firmwarewindows_10ideacentre_g5-14imb05_firmwarev50t-13imb_g2_firmwarethinkcentre_m70qthinkstation_p520v520thinkcentre_m630eideacentre_510a-15arrthinkcentre_m710ethinkcentre_m710t_firmwarev50t-13imbv530-15arrideacentre_c5-14mb05thinkcentre_m75n_firmwarethinkcentre_m720e_firmwarethinkcentre_m80qv330_firmwareideacentre_5-14iob6v50a-24imb_firmwarethinkcentre_m70c_firmwareideacentre_510s-07ick_firmwarev530s-07icb_firmwarev50t-13imb_g2thinkcentre_m810zthinkcentre_m90tthinkcentre_m75nthinkstation_p340ideacentre_310s-08igm_firmwarethinkcentre_m810z_firmwareideacentre_c5-14mb05_firmwareideacentre_5-14iob6_firmwareideacentre_510a-15arr_firmwarethinkcentre_m710tthinkcentre_m60e_tinythinkcentre_m70a_firmwarev530-15icrv530s-07icbthinkcentre_m70cthinkcentre_m710e_firmwarev50a-22imbthinkcentre_qt_m410thinkcentre_qt_b415_firmwarev50a-24imbthinkcentre_m90sv520s_firmwarethinkcentre_m60e_tiny_firmwareideacentre_310s-08igmideacentre_510s-07icb_firmwarethinkcentre_m90av50s-07imbideacentre_creator_5-14iob6thinkcentre_m75s_gen_2thinkstation_p340_firmwarethinkcentre_m70a_gen_2v50a-22imb_firmwarethinkstation_p920thinkcentre_m70sideacentre_5-14imb05thinkcentre_m70tthinkcentre_m80tv50s-07imb_firmwarev30a-22imlthinkstation_p340_tiny_firmwarethinkcentre_m90a_firmwarev520_firmwarethinkstation_p520c_firmwarethinkcentre_m70av30a-22iml_firmwarethinkcentre_m820z_firmwarethinkcentre_qt_m415thinkcentre_qt_m410_firmwarev530s-07icr_firmwareideacentre_510s-07ickthinkcentre_m90a_tinythinkcentre_m75t_gen_2_firmwarethinkstation_p720thinkcentre_m710s_firmwarev530s-07icrv55t-15apiideacentre_5-14imb05_firmwarev330v50t-13imb_firmwarethinkcentre_m820zideacentre_3-07imb05_firmwarethinkcentre_m710sthinkstation_p920_firmwareideacentre_gaming_5-14iob6_firmwarethinkcentre_m80t_firmwareideacentre_gaming_5-14iob6v520sthinkcentre_qt_b415thinkcentre_m70t_firmwareideacentre_g5-14imb05thinkcentre_m70a_gen_2_firmwarev530-15icr_firmwarethinkstation_p720_firmwarethinkcentre_m80s_firmwareideacentre_3-07imb05v55t-15api_firmwarethinkcentre_m75t_gen_2ideacentre_creator_5-14iob6_firmwarethinkstation_p340_tinythinkstation_p520cthinkcentre_m90t_firmwareDesktop BIOS
CWE ID-CWE-287
Improper Authentication
CVE-2023-6044
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-6.3||MEDIUM
EPSS-0.04% / 9.96%
||
7 Day CHG~0.00%
Published-19 Jan, 2024 | 20:09
Updated-30 May, 2025 | 14:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A privilege escalation vulnerability was reported in Lenovo Vantage that could allow a local attacker with physical access to impersonate Lenovo Vantage Service and execute arbitrary code with elevated privileges.

Action-Not Available
Vendor-Lenovo Group Limited
Product-vantageVantage
CWE ID-CWE-290
Authentication Bypass by Spoofing
CVE-2021-3453
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-6.8||MEDIUM
EPSS-0.05% / 14.08%
||
7 Day CHG~0.00%
Published-16 Jul, 2021 | 20:30
Updated-24 Jul, 2025 | 03:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Some Lenovo Notebook, ThinkPad, and Lenovo Desktop systems have BIOS modules unprotected by Intel Boot Guard that could allow an attacker with physical access the ability to write to the SPI flash storage.

Action-Not Available
Vendor-Lenovo Group Limited
Product-ideapad_s940-14iwlyoga_s730-13imlv130-15igm_firmwarethinkpad_yoga_15ideapad_s940-14iilthinkpad_x1_carbon_3rd_gen_firmwareideapad_slim_1-14ast-05_firmwareideacentre_aio_5-24imb05ideacentre_aio_5-74imb05730s-13imlthinkpad_t550ideapad_slim_1-11ast-05ideapad_slim_1-11ast-05_firmwarethinkpad_x1_carbon_3rd_genv330-15isk_firmwareideapad_1-14igl05_firmwareyoga_s940-14iwl_firmwarethinkpad_helix_firmwarethinkpad_w550s730s-13iml_firmwarethinkpad_t550_firmwarethinkpad_yoga_15_firmwareideapad_1-11igl05yoga_s730-13iml_firmwarethinkpad_helixideacentre_aio_5-24imb05_firmwareyoga_s940-14iilthinkpad_w550s_firmwareideacentre_aio_5-74imb05_firmwareideapad_1-11igl05_firmwareideapad_slim_1-14ast-05v330-15ikbv330-15iskideapad_s940-14iwl_firmwareideapad_1-14igl05thinkpad_x250_firmwareideapad_s940-14iil_firmwareyoga_s940-14iwlv130-15igmv330-15ikb_firmwarethinkpad_x250yoga_s940-14iil_firmwareBIOS
CWE ID-CWE-693
Protection Mechanism Failure
CVE-2022-3728
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-6.1||MEDIUM
EPSS-0.13% / 32.77%
||
7 Day CHG~0.00%
Published-09 Oct, 2023 | 20:48
Updated-19 Sep, 2024 | 13:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability was reported in ThinkPad T14s Gen 3 and X13 Gen3 that could cause the BIOS tamper detection mechanism to not trigger under specific circumstances which could allow unauthorized access.

Action-Not Available
Vendor-Lenovo Group Limited
Product-thinkpad_t14s_gen_3_firmwarethinkpad_x13_gen_3_firmwarethinkpad_x13_gen_3thinkpad_t14s_gen_3ThinkPad T14s Gen 3 BIOSThinkPad X13 Gen3 BIOS
CWE ID-CWE-1263
Improper Physical Access Control
CVE-2024-7756
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-6.8||MEDIUM
EPSS-0.02% / 3.71%
||
7 Day CHG~0.00%
Published-13 Sep, 2024 | 17:26
Updated-16 Sep, 2024 | 17:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A potential vulnerability was reported in the ThinkPad L390 Yoga and 10w Notebook that could allow a local attacker to escalate privileges by accessing an embedded UEFI shell.

Action-Not Available
Vendor-Lenovo Group Limited
Product-L390 (type 20NR, 20NS) Laptops (ThinkPad) BIOS10w (Type 82ST, 82SU) Laptop (Lenovo) BIOSL390 Yoga (type 20NT, 20NU) Laptops (ThinkPad) BIOSthinkpad_l390_yoga_firmware10w_firmware
CWE ID-CWE-489
Active Debug Code
CVE-2020-8334
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-6.1||MEDIUM
EPSS-0.06% / 19.52%
||
7 Day CHG~0.00%
Published-09 Jun, 2020 | 19:50
Updated-17 Sep, 2024 | 00:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The BIOS tamper detection mechanism was not triggered in Lenovo ThinkPad T495s, X395, T495, A485, A285, A475, A275 which may allow for unauthorized access.

Action-Not Available
Vendor-Lenovo Group Limited
Product-thinkpad_t495s_firmwarethinkpad_a275thinkpad_t495thinkpad_a275_firmwarethinkpad_x395thinkpad_a485thinkpad_a485_firmwarethinkpad_t495_firmwarethinkpad_x395_firmwarethinkpad_a475_firmwarethinkpad_a285thinkpad_a285_firmwarethinkpad_t495sthinkpad_a475BIOS
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
CVE-2020-8320
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-6.4||MEDIUM
EPSS-0.05% / 13.68%
||
7 Day CHG~0.00%
Published-09 Jun, 2020 | 19:50
Updated-16 Sep, 2024 | 17:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An internal shell was included in BIOS image in some ThinkPad models that could allow escalation of privilege.

Action-Not Available
Vendor-Lenovo Group Limited
Product-thinkpad_t480_firmwarethinkpad_l460_firmwarethinkpad_p50_firmwarethinkpad_x1_carbon_firmwarethinkpad_s3_3rd_gen_firmwarethinkpad_e580_firmwarethinkpad_e490thinkpad_x260_firmwarethinkpad_e590_firmwarethinkpad_t570thinkpad_l560thinkpad_t490thinkpad_p51sthinkpad_x280_firmwarethinkpad_p73_firmwarethinkpad_t590thinkpad_p53thinkpad_e575thinkpad_p72_firmwarethinkpad_x1_tabletthinkpad_t495_firmwarethinkpad_l460thinkpad_l590thinkpad_p52thinkpad_e560p_firmwarethinkpad_l480thinkpad_e475thinkpad_s2_yoga_4th_genthinkpad_p70thinkpad_t460thinkpad_l390_yoga_firmwarethinkpad_x390_firmwarethinkpad_e470_firmwarethinkpad_r490_firmwarethinkpad_11ethinkpad_x270thinkpad_a285thinkpad_t460pthinkpad_e15_firmwarethinkpad_p1thinkpad_l580_firmwarethinkpad_e460thinkpad_x1_tablet_firmwarethinkpad_l1415_firmwarethinkpad_l380_yoga_firmwarethinkpad_x280thinkpad_x390thinkpad_p50s_firmwarethinkpad_r14thinkpad_yoga_370thinkpad_s3_gen_2_firmwarethinkpad_l470thinkpad_e570_firmwarethinkpad_l470_firmwarethinkpad_s5_firmwarethinkpad_s3_firmwarethinkpad_t490_firmwarethinkpad_x390_yoga_firmwarethinkpad_l380_firmwarethinkpad_r590_firmwarethinkpad_l380thinkpad_t560_firmwarethinkpad_t580thinkpad_t590_firmwarethinkpad_x1_yoga_firmwarethinkpad_l390_yogathinkpad_yoga_11e_4th_gen_firmwarethinkpad_x1_extremethinkpad_x1_yogathinkpad_l490_firmwarethinkpad_e485_firmwarethinkpad_yoga_11e_3rd_gen_firmwarethinkpad_s5_2nd_gen_firmwarethinkpad_x1_carbonthinkpad_e560_firmwarethinkpad_t460p_firmwarethinkpad_t570_firmwarethinkpad_l13_firmwarethinkpad_yoga_11e_5th_genthinkpad_p52s_firmwarethinkpad_r490thinkpad_13_firmwarethinkpad_a275_firmwarethinkpad_e585thinkpad_l570_firmwarethinkpad_e590thinkpad_a475_firmwarethinkpad_x380_yoga_firmwarethinkpad_a485_firmwarethinkpad_e575_firmwarethinkpad_13_2nd_genthinkpad_e490sthinkpad_t25_firmwarethinkpad_p1_firmwarethinkpad_11e_yoga_gen_6_firmwarethinkpad_p52_firmwarethinkpad_s2_yoga_4th_gen_firmwarethinkpad_a275thinkpad_t580_firmwarethinkpad_e15thinkpad_e485thinkpad_l480_firmwarethinkpad_x380_yogathinkpad_a485thinkpad_s2_yoga_3rd_gen_firmwarethinkpad_t25thinkpad_p53sthinkpad_t480sthinkpad_e465_firmwarethinkpad_t495sthinkpad_p51_firmwarethinkpad_t460sthinkpad_t495s_firmwarethinkpad_x390_yogathinkpad_e460_firmwarethinkpad_e455thinkpad_e14thinkpad_11e_firmwarethinkpad_e570thinkpad_s5_2nd_genthinkpad_l570thinkpad_e560thinkpad_p43sthinkpad_a475thinkpad_e555thinkpad_x1_extreme_firmwarethinkpad_t490s_firmwarethinkpad_e565thinkpad_e475_firmwarethinkpad_e565_firmwarethinkpad_t470s_firmwarethinkpad_l580thinkpad_p50thinkpad_r590thinkpad_yoga_11e_5th_gen_firmwarethinkpad_x395_firmwarethinkpad_e580thinkpad_r14_firmwarethinkpad_e490s_firmwarethinkpad_p71thinkpad_s3_gen_2thinkpad_s5thinkpad_t470p_firmwarethinkpad_e480_firmwarethinkpad_11e_yoga_gen_6thinkpad_p51s_firmwarethinkpad_s1_firmwarethinkpad_e490_firmwarethinkpad_p70_firmwarethinkpad_t560thinkpad_x395thinkpad_s1_3rd_firmwarethinkpad_t460_firmwarethinkpad_t460s_firmwarethinkpad_13thinkpad_t470thinkpad_yoga_11e_3rd_genthinkpad_p50sthinkpad_p53_firmwarethinkpad_x270_firmwarethinkpad_13_2nd_gen_firmwarethinkpad_s2_yoga_3rd_genthinkpad_s1_3rdthinkpad_s1thinkpad_e480thinkpad_l490thinkpad_l380_yogathinkpad_p51thinkpad_t480s_firmwarethinkpad_yoga_260thinkpad_s3thinkpad_s3_3rd_genthinkpad_p71_firmwarethinkpad_l13thinkpad_e585_firmwarethinkpad_t490sthinkpad_p73thinkpad_e555_firmwarethinkpad_e470thinkpad_yoga_11e_4th_genthinkpad_l590_firmwarethinkpad_e560pthinkpad_t470sthinkpad_p72thinkpad_t470pthinkpad_yoga_260_firmwarethinkpad_a285_firmwarethinkpad_e14_firmwarethinkpad_l1415thinkpad_l560_firmwarethinkpad_x260thinkpad_t495thinkpad_yoga_370_firmwarethinkpad_p53s_firmwarethinkpad_e465thinkpad_t480thinkpad_t470_firmwarethinkpad_p52sthinkpad_p43s_firmwarethinkpad_e455_firmwareBIOS
CWE ID-CWE-489
Active Debug Code
CWE ID-CWE-269
Improper Privilege Management
CVE-2020-8335
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-6.1||MEDIUM
EPSS-0.07% / 22.46%
||
7 Day CHG~0.00%
Published-01 Sep, 2020 | 21:30
Updated-16 Sep, 2024 | 18:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The BIOS tamper detection mechanism was not triggered in Lenovo ThinkPad A285, BIOS versions up to r0xuj70w; A485, BIOS versions up to r0wuj65w; T495 BIOS versions up to r12uj55w; T495s/X395, BIOS versions up to r13uj47w, while the emergency-reset button is pressed which may allow for unauthorized access.

Action-Not Available
Vendor-Lenovo Group Limited
Product-thinkpad_a275thinkpad_a275_firmwarethinkpad_a485thinkpad_x395thinkpad_x395_firmwarethinkpad_a475_firmwarethinkpad_t495s_jazz_firmwarethinkpad_a285thinkpad_a285_firmwarethinkpad_a485_firmwarethinkpad_t495s_jazzthinkpad_x1_carbon_\(20bx\)_firmwarethinkpad_t495_driftthinkpad_t495_drift_firmwarethinkpad_x1_carbon_\(20bx\)thinkpad_a475ThinkPad A485 BIOSThinkPad A285 BIOSThinkPad T495s/X395 BIOSThinkPad T495 BIOS
CVE-2020-8336
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-6.4||MEDIUM
EPSS-0.05% / 15.91%
||
7 Day CHG~0.00%
Published-09 Jun, 2020 | 19:50
Updated-16 Sep, 2024 | 19:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Lenovo implemented Intel CSME Anti-rollback ARB protections on some ThinkPad models to prevent roll back of CSME Firmware in flash.

Action-Not Available
Vendor-Lenovo Group Limited
Product-thinkpad_t490_\(20qx\)thinkpad_x1_extreme_\(20mx\)thinkpad_e15thinkpad_l13_1st_genthinkpad_e490thinkpad_p1_\(20qx\)thinkpad_p1_\(20qx\)_firmwarethinkpad_e590_firmwarethinkpad_p53s_\(20nx\)_firmwarethinkpad_t590_\(20nx\)thinkpad_t490_\(20rx\)thinkpad_x390_yogathinkpad_x1_extreme_\(20mx\)_firmwarethinkpad_e14thinkpad_p72_\(20mx\)_firmwarethinkpad_l590thinkpad_p53_\(20qx\)_firmwarethinkpad_x1_carbon_\(20rx\)thinkpad_s2_yoga_4th_genthinkpad_x1_carbon_\(20qx\)_firmwarethinkpad_l390_yoga_firmwarethinkpad_r490_firmwarethinkpad_p43s_\(20rx\)thinkpad_x1_yoga_\(20qx\)_firmwarethinkpad_t490_\(20nx\)thinkpad_r590thinkpad_p1_\(20mx\)_firmwarethinkpad_x390_\(20qx\)thinkpad_e15_firmwarethinkpad_p43s_\(20rx\)_firmwarethinkpad_r14_firmwarethinkpad_e490s_firmwarethinkpad_s3_gen_2thinkpad_t590_\(20nx\)_firmwarethinkpad_x1_carbon_\(20rx\)_firmwarethinkpad_p73_\(20qx\)thinkpad_r14thinkpad_x1_yoga_\(20qx\)thinkpad_p72_\(20mx\)thinkpad_p73_\(20qx\)_firmwarethinkpad_s3_gen_2_firmwarethinkpad_t490_\(20qx\)_firmwarethinkpad_e490_firmwarethinkpad_s3_firmwarethinkpad_l1415_gen_1thinkpad_x390_\(20sx\)thinkpad_x390_yoga_firmwarethinkpad_r590_firmwarethinkpad_x1_extreme_\(20qx\)_firmwarethinkpad_l390_yogathinkpad_l13_1st_gen_firmwarethinkpad_l490_firmwarethinkpad_x390_\(20qx\)_firmwarethinkpad_x1_extreme_\(20qx\)thinkpad_l1415_gen_1_firmwarethinkpad_p52_\(20mx\)thinkpad_l490thinkpad_s3thinkpad_x1_yoga_\(20sx\)thinkpad_r490thinkpad_x390_\(20sx\)_firmwarethinkpad_t490_\(20rx\)_firmwarethinkpad_p1_\(20mx\)thinkpad_l590_firmwarethinkpad_e590thinkpad_t490_\(20nx\)_firmwarethinkpad_e14_firmwarethinkpad_x1_yoga_\(20sx\)_firmwarethinkpad_e490sthinkpad_t490s_\(20nx\)_firmwarethinkpad_p53s_\(20nx\)thinkpad_p52_\(20mx\)_firmwarethinkpad_t490s_\(20nx\)thinkpad_x1_carbon_\(20qx\)thinkpad_p53_\(20qx\)thinkpad_s2_yoga_4th_gen_firmwareBIOS
CVE-2021-42849
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-6.8||MEDIUM
EPSS-0.05% / 13.68%
||
7 Day CHG~0.00%
Published-18 May, 2022 | 16:10
Updated-04 Aug, 2024 | 03:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A weak default password for the serial port was reported in some Lenovo Personal Cloud Storage devices that could allow unauthorized device access to an attacker with physical access.

Action-Not Available
Vendor-Lenovo Group Limited
Product-t2prot1_firmwaret2pro_firmwaret1x1x1_firmwaret2_firmwaret2a1_firmwarea1Personal Cloud Storage X1Personal Cloud Storage T1Personal Cloud Storage A1Personal Cloud Storage T2Personal Cloud Storage T2Pro
CWE ID-CWE-798
Use of Hard-coded Credentials
CWE ID-CWE-287
Improper Authentication
CVE-2019-6171
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-6.4||MEDIUM
EPSS-0.14% / 34.64%
||
7 Day CHG~0.00%
Published-19 Aug, 2019 | 14:56
Updated-16 Sep, 2024 | 20:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability was reported in various BIOS versions of older ThinkPad systems that could allow a user with administrative privileges or physical access the ability to update the Embedded Controller with unsigned firmware.

Action-Not Available
Vendor-Lenovo Group Limited
Product-20ef_firmware20h8_firmware20l2_firmware20bl_firmware20eg20ef20jr20ak_firmware20eu_firmware20dh_firmware20an_firmware20ng_firmware20bf20fv_firmware20mu_firmware20ln20ju_firmware20m7_firmware20ln_firmware20dj_firmware20bw_firmware20gb20mv20aq_firmware20j520nq20fm_firmware20jh_firmware20mx_firmware20j1235x_firmware20f520fu20jh20k6247x_firmware20mw_firmware20m620dd20g9_firmware20jv20hv343x20hs_firmware20k520jq20ku20kv_firmware20jj_firmware247x20aw_firmware20m520an20g820nu243x20n8234x_firmware20b7_firmware344x_firmware20jv_firmware20lh20nu_firmware20hm30eh_firmware20ab_firmware20kt20kl20kd20de_firmware20b3_firmware20eu20mw20ey20n9_firmware20fx_firmware20j620f620j7_firmware20e020a9_firmware20fw_firmware20dt20bw20km20dj20lm20h6_firmware20nr20nr_firmware244x_firmware337x20bx_firmware20fv20da_firmware20al20ew_firmware20kn_firmware20fn_firmware243x_firmware30eh20ga_firmware20ev_firmware20h120km_firmware20kc20b020aa_firmware20ab20ht_firmware20lx_firmware20j6_firmware20hv_firmware20g4_firmware244x246x_firmware20ng20h2_firmware20bm20j5_firmware20da20h620h4_firmware20h420dq_firmware20be_firmware20a8_firmware20a920lh_firmware20jr_firmware20bx20hn_firmware3xxx_firmware20ev34xx20nt20et20nn_firmware20ks20am20lq_firmware233x_firmware20d9_firmware20be20a820h23xxx20ku_firmware20nn20k5_firmware20aq20lj20lr_firmware20hs20ja20dg20bl20dc20f120ja_firmware20n9232x_firmware20fw20nq_firmware20ar20b6234x20aa20ga20j1_firmware20h1_firmware20kd_firmware20ds_firmware20ls_firmware20kt_firmware20hu20j2235x230x232x20bm_firmware20g5_firmware20ht20nt_firmware20ks_firmware20b720fu_firmware20jj20bg20m5_firmware20ns20f2_firmware20dg_firmware20bv_firmware20bf_firmware20e0_firmware20j2_firmware20bg_firmware20df20m734xx_firmware20b6_firmware20h5_firmware20a7_firmware20f5_firmware20lr20ew20et_firmware20n8_firmware20ns_firmware20ak20aj20kv20bu344x20m8_firmware20am_firmware20d920m820lt20eg_firmware20kq20jq_firmware20k6_firmware20dq20de20dh20aj_firmware20ac20j720dr20mx20fx20ex_firmware336x20gb_firmware20f1_firmware20mv_firmware337x_firmware20hm_firmware20lx239x20kq_firmware20kl_firmware20g920lq20mu20fm20lj_firmware20g4248x_firmware20hu_firmware20ey_firmware20fn20f6_firmware20h820ds20j4_firmware20dr_firmware246x343x_firmware242x20bv20h520ls20b3242x_firmware20f220dc_firmware20l220hn20ex20m6_firmware20lt_firmware20ju20j420ar_firmware233x20g520kc_firmware230x_firmware20al_firmware20lm_firmware20b0_firmware20aw20dt_firmware20g8_firmware20a7248x20ac_firmware20dd_firmware20df_firmware20bu_firmware239x_firmware20kn336x_firmwareBIOS
CVE-2021-3614
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-6.4||MEDIUM
EPSS-0.05% / 13.84%
||
7 Day CHG~0.00%
Published-16 Jul, 2021 | 20:30
Updated-03 Aug, 2024 | 17:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability was reported on some Lenovo Notebook systems that could allow an attacker with physical access to elevate privileges under certain conditions during a BIOS update performed by Lenovo Vantage.

Action-Not Available
Vendor-Lenovo Group Limited
Product-ideapad_yoga_s940-14iil_firmwareideapad_730-13imlideapad_s940-14iwlv130-15igm_firmwarev130-15ikb_firmwareideapad_s940-14iilideapad_yoga_s940-14iwlideapad_flex_5-15alc05ideapad_flex_5-14alc05ideapad_slim_1-14ast-05_firmwareideapad_yoga_s940-14iil100e_2nd_genv330-15isk_firmwareideapad_slim_1-11ast-05ideapad_slim_1-11ast-05_firmwareideapad_1-14igl05_firmwareideapad_yoga_s940-14iwl_firmware100e_2nd_gen_firmwareideapad_yoga_c940-15irh_firmwareideapad_1-14ada05_firmwarev130-15ikbideapad_1-11ada05_firmware300e_2nd_genideapad_yoga_c940-15irh300e_2nd_gen_firmwareideapad_1-11igl05ideapad_flex_5-15alc05_firmwareideapad_flex_5-14alc05_firmwareideapad_1-14ada05ideapad_1-11igl05_firmwareideapad_slim_1-14ast-05v330-15ikbv330-15iskideapad_1-11ada05ideapad_s940-14iwl_firmwareideapad_1-14igl05ideapad_s940-14iil_firmwareideapad_yoga_s730-13iml_firmwarev130-15igmideapad_yoga_s730-13imlv330-15ikb_firmwareideapad_730-13iml_firmwareNotebook BIOS
CWE ID-CWE-636
Not Failing Securely ('Failing Open')
CVE-2022-48183
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-6.1||MEDIUM
EPSS-0.13% / 32.77%
||
7 Day CHG~0.00%
Published-09 Oct, 2023 | 20:56
Updated-19 Sep, 2024 | 13:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability was reported in ThinkPad T14s Gen 3 and X13 Gen3 that could cause the BIOS tamper detection mechanism to not trigger under specific circumstances which could allow unauthorized access.

Action-Not Available
Vendor-Linux Kernel Organization, IncLenovo Group LimitedMicrosoft Corporation
Product-linux_kernelthinkpad_t14s_gen_3_firmwarethinkpad_x13_gen_3_firmwarethinkpad_t14s_gen_3windowsthinkpad_x13_gen_3ThinkPad T14s X13 Gen3 BIOS - WindowsThinkPad T14s Gen 3 BIOS - LinuxThinkPad X13 Gen3 BIOS - WindowsThinkPad X13 Gen3 BIOS - Linux
CWE ID-CWE-1263
Improper Physical Access Control
CVE-2022-48182
Matching Score-8
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-8
Assigner-Lenovo Group Ltd.
CVSS Score-6.1||MEDIUM
EPSS-0.13% / 32.77%
||
7 Day CHG~0.00%
Published-09 Oct, 2023 | 20:55
Updated-19 Sep, 2024 | 13:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability was reported in ThinkPad T14s Gen 3 and X13 Gen3 that could cause the BIOS tamper detection mechanism to not trigger under specific circumstances which could allow unauthorized access.

Action-Not Available
Vendor-Linux Kernel Organization, IncLenovo Group LimitedMicrosoft Corporation
Product-linux_kernelthinkpad_t14s_gen_3_firmwarethinkpad_x13_gen_3_firmwarethinkpad_t14s_gen_3windowsthinkpad_x13_gen_3ThinkPad T14s X13 Gen3 BIOS - WindowsThinkPad T14s Gen 3 BIOS - LinuxThinkPad X13 Gen3 BIOS - WindowsThinkPad X13 Gen3 BIOS - Linux
CWE ID-CWE-1263
Improper Physical Access Control
CVE-2021-3633
Matching Score-6
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-6
Assigner-Lenovo Group Ltd.
CVSS Score-7.3||HIGH
EPSS-0.02% / 3.72%
||
7 Day CHG~0.00%
Published-17 Aug, 2021 | 16:25
Updated-03 Aug, 2024 | 17:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A DLL preloading vulnerability was reported in Lenovo Driver Management prior to version 2.9.0719.1104 that could allow privilege escalation.

Action-Not Available
Vendor-Lenovo Group Limited
Product-drivers_managementDriver Management
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2020-8324
Matching Score-6
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-6
Assigner-Lenovo Group Ltd.
CVSS Score-5||MEDIUM
EPSS-0.06% / 19.35%
||
7 Day CHG~0.00%
Published-14 Apr, 2020 | 21:05
Updated-16 Sep, 2024 | 18:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability was reported in LenovoAppScenarioPluginSystem for Lenovo System Interface Foundation prior to version 1.2.184.31 that could allow unsigned DLL files to be executed.

Action-Not Available
Vendor-Lenovo Group Limited
Product-system_interface_foundationLenovoAppScenarioPluginSystem for Lenovo System Interface Foundation
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CWE ID-CWE-20
Improper Input Validation
CVE-2021-1453
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-6.8||MEDIUM
EPSS-0.05% / 14.51%
||
7 Day CHG~0.00%
Published-24 Mar, 2021 | 20:06
Updated-08 Nov, 2024 | 23:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XE Software for the Catalyst 9000 Family Arbitrary Code Execution Vulnerability

A vulnerability in the software image verification functionality of Cisco IOS XE Software for the Cisco Catalyst 9000 Family of switches could allow an unauthenticated, physical attacker to execute unsigned code at system boot time. The vulnerability is due to an improper check in the code function that manages the verification of the digital signatures of system image files during the initial boot process. An attacker could exploit this vulnerability by loading unsigned software on an affected device. A successful exploit could allow the attacker to boot a malicious software image or execute unsigned code and bypass the image verification check part of the secure boot process of an affected device. To exploit this vulnerability, the attacker would need to have unauthenticated physical access to the device or obtain privileged access to the root shell on the device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xeCisco IOS XE Software
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2021-35097
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.3||HIGH
EPSS-0.01% / 0.32%
||
7 Day CHG~0.00%
Published-02 Sep, 2022 | 11:30
Updated-04 Aug, 2024 | 00:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible authentication bypass due to improper order of signature verification and hashing in the signature verification call in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwaresd_8cx_gen3_firmwaresm6250p_firmwareqcs610qca8337qca6431_firmwarewcd9360_firmwaresdx65wcn3950_firmwaresc8180x\+sdx55qcs2290qca6595au_firmwaresa6155qca6335csra6620_firmwaresd_675_firmwarecsra6640_firmwareqcs6125_firmwaresa415mwcn3998wcd9371_firmwaresd_8cx_gen2_firmwaresm4125sd720gwcn3950qsm8350_firmwareqsm8350sd460_firmwaresm7315_firmwarewcn7850qca6574au_firmwarewcd9375_firmwareqca8081_firmwaresa6155_firmwarewcn3998_firmwareqca6420wcd9360sd680_firmwarewcn3999sd_8cx_gen2qrb5165_firmwareqrb5165m_firmwareqcs6125sa8155_firmwaresd662_firmwareqcs405qca6430wcd9340sd765gsw5100qca6436sd680wcn6851sa6155pwcn7851_firmwarewcd9341qca6431qca6696_firmwarewcd9371sd750gsd870_firmwarewcn3910_firmwaresd_8cxwsa8830_firmwaresd855_firmwaresd865_5g_firmwarewcn3988wcn7850_firmwaresa8195p_firmwarewcn6750_firmwarewcn3991qca8337_firmwarewcd9380_firmwaresw5100pqca6564ausdx55m_firmwarewcn6856_firmwareqca6574wcd9380qcs410sd690_5g_firmwaresdx50m_firmwaresdx24_firmwareqca6430_firmwarewcd9335_firmwarewcn3980qca6335_firmwarewcd9340_firmwarewsa8815wcn6850sd7cwcn3910qca6426_firmwaresd695wcn3980_firmwaresd730sdx55mqca6421_firmwarewcn6740_firmwaresd678_firmwarear8031_firmwareqrb5165wcn6851_firmwareqca6564a_firmwareqcm4290_firmwaresd480sd870wcn6855sa8540psw5100p_firmwareqcs610_firmwaresa6145psd695_firmwarear8031qca6595_firmwareqcs405_firmwareqca6391_firmwaresd780g_firmwarewcd9370_firmwaresdx55sd888_firmwaresa8155pcsra6640sd675ar8035_firmwareqcm2290wcn3991_firmwaremdm9150_firmwarewsa8830sd678qcs2290_firmwaresd7c_firmwarecsrb31024csra6620qcs4290sd765g_firmwareqca6420_firmwareqca6390_firmwaresd690_5gsd730_firmwarewcd9370sd675_firmwareqca6564qca6426wcn3990_firmwareqrb5165n_firmwareqca9377sd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwaresd662sa8155sa9000p_firmwaresdx55_firmwareqca6595auwcn3999_firmwaresm7250p_firmwareqca6436_firmwareqrb5165nqca6564au_firmwaresd778gsa6155p_firmwareqca6310sa515m_firmwareqcs6490wcn7851sdxr2_5gsa415m_firmwarewcn3988_firmwaresa6145p_firmwareqca6421sd778g_firmwaresm6250sa8195pwsa8810_firmwaresd765_firmwarewcd9335qca8081qca6174a_firmwareqcs4290_firmwarewcd9385qcs6490_firmwaresd_8cx_gen3ar8035qca6390sd750g_firmwareaqt1000wcd9375sc8180x\+sdx55_firmwaresm6250_firmwareqcm6490sd888_5g_firmwarewcn6850_firmwarewsa8815_firmwarewsa8835_firmwareqca6564aqcm6125_firmwareqcm2290_firmwarewcn3990sd_675sd780gsd865_5gqca6595sdx24sd888wsa8835sd665_firmwaresa8540p_firmwaresd888_5gsm6250pqca6574awcn6855_firmwareqca6174asm7325pqca6310_firmwarewcn6750sa515msa9000pqca6574_firmwaresd855sm4125_firmwaresm7325p_firmwaresd665qca6175asd765qca6574a_firmwaresd768g_firmwareqrb5165msd850_firmwaresm7315sd460qca6391aqt1000_firmwaresdx65_firmwareqcm4290csrb31024_firmwareqcm6490_firmwaresdx50msd480_firmwareqca6574ausa8155p_firmwarewcd9341_firmwareqcm6125wsa8810mdm9150wcn6856qca6564_firmwaresd768gwcn6740qca6696sd845_firmwaresd845sm7250psd720g_firmwaresw5100_firmwareqcs410_firmwareqca6175a_firmwaresd850Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2021-30066
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.00% / 0.15%
||
7 Day CHG~0.00%
Published-03 Apr, 2022 | 22:01
Updated-03 Aug, 2024 | 22:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

On Schneider Electric ConneXium Tofino Firewall TCSEFEA23F3F22 before 03.23, TCSEFEA23F3F20/21, and Belden Tofino Xenon Security Appliance, an arbitrary firmware image can be loaded because firmware signature verification (for a USB stick) can be bypassed. NOTE: this issue exists because of an incomplete fix of CVE-2017-11400.

Action-Not Available
Vendor-beldenn/a
Product-tofino_argon_fa-tsa-220-mm\/txeagle_20_tofino_943_987-504-mm\/txtofino_argon_fa-tsa-220-tx\/txtcsefea23f3f21_firmwareeagle_20_tofino_943_987-502_-tx\/mm_firmwareeagle_20_tofino_943_987-501-tx\/txtofino_argon_fa-tsa-220-mm\/tx_firmwaretofino_argon_fa-tsa-100-tx\/txtofino_xenon_security_appliance_firmwareeagle_20_tofino_943_987-501-tx\/tx_firmwaretcsefea23f3f21eagle_20_tofino_943_987-504-mm\/tx_firmwaretofino_argon_fa-tsa-220-tx\/mm_firmwaretofino_xenon_security_appliancetofino_argon_fa-tsa-100-tx\/tx_firmwareeagle_20_tofino_943_987-502_-tx\/mmtcsefea23f3f22_firmwaretofino_argon_fa-tsa-220-tx\/tx_firmwareeagle_20_tofino_943_987-505-mm\/mmtofino_argon_fa-tsa-220-tx\/mmtcsefea23f3f22eagle_20_tofino_943_987-505-mm\/mm_firmwaretofino_argon_fa-tsa-220-mm\/mmtcsefea23f3f20tofino_argon_fa-tsa-220-mm\/mm_firmwaretcsefea23f3f20_firmwaren/a
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2020-3209
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-6.8||MEDIUM
EPSS-0.42% / 61.19%
||
7 Day CHG~0.00%
Published-03 Jun, 2020 | 17:40
Updated-15 Nov, 2024 | 17:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XE Software Digital Signature Verification Bypass Vulnerability

A vulnerability in software image verification in Cisco IOS XE Software could allow an unauthenticated, physical attacker to install and boot a malicious software image or execute unsigned binaries on an affected device. The vulnerability is due to an improper check on the area of code that manages the verification of the digital signatures of system image files during the initial boot process. An attacker could exploit this vulnerability by loading unsigned software on an affected device. A successful exploit could allow the attacker to install and boot a malicious software image or execute unsigned binaries on the targeted device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xeCisco IOS XE Software 3.2.0SG
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2022-20944
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.01% / 1.16%
||
7 Day CHG~0.00%
Published-10 Oct, 2022 | 20:43
Updated-01 Nov, 2024 | 18:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XE Software for Catalyst 9200 Series Switches Arbitrary Code Execution Vulnerability

A vulnerability in the software image verification functionality of Cisco IOS XE Software for Cisco Catalyst 9200 Series Switches could allow an unauthenticated, physical attacker to execute unsigned code at system boot time. This vulnerability is due to an improper check in the code function that manages the verification of the digital signatures of system image files during the initial boot process. An attacker could exploit this vulnerability by loading unsigned software on an affected device. A successful exploit could allow the attacker to boot a malicious software image or execute unsigned code and bypass the image verification check part of the boot process of the affected device. To exploit this vulnerability, the attacker needs either unauthenticated physical access to the device or privileged access to the root shell on the device. Note: In Cisco IOS XE Software releases 16.11.1 and later, root shell access is protected by the Consent Token mechanism. However, an attacker with level-15 privileges could easily downgrade the Cisco IOS XE Software running on a device to a release where root shell access is more readily available.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-catalyst_c9200-48tcatalyst_c9200l-48pxg-4xcatalyst_c9200l-24t-4xcatalyst_9200catalyst_c9200l-24p-4gcatalyst_c9200l-24t-4gcatalyst_c9200l-24pxg-4xios_xecatalyst_c9200l-48t-4xcatalyst_9200lcatalyst_9200cxcatalyst_c9200l-24pxg-2ycatalyst_c9200-24pcatalyst_c9200l-48pxg-2ycatalyst_c9200-24tcatalyst_c9200l-48p-4gcatalyst_c9200l-48t-4gcatalyst_c9200l-24p-4xcatalyst_c9200-48pcatalyst_c9200l-48p-4xCisco IOS XE Software
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2022-1739
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-6.8||MEDIUM
EPSS-0.01% / 1.48%
||
7 Day CHG~0.00%
Published-24 Jun, 2022 | 15:00
Updated-17 Apr, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
2.2.1 IMPROPER VERIFICATION OF CRYPTOGRAPHIC SIGNATURE CWE-347

The tested version of Dominion Voting Systems ImageCast X does not validate application signatures to a trusted root certificate. Use of a trusted root certificate ensures software installed on a device is traceable to, or verifiable against, a cryptographic key provided by the manufacturer to detect tampering. An attacker could leverage this vulnerability to install malicious code, which could also be spread to other vulnerable ImageCast X devices via removable media.

Action-Not Available
Vendor-dominionvotingDominion Voting Systems
Product-imagecast_xdemocracy_suiteImageCast X firmwareImageCast X application
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2021-35113
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.3||HIGH
EPSS-0.01% / 0.56%
||
7 Day CHG~0.00%
Published-02 Sep, 2022 | 11:30
Updated-04 Aug, 2024 | 00:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible authentication bypass due to improper order of signature verification and hashing in the signature verification call in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwarewcn3991_firmwarewcn3991wcd9380_firmwaresd678sm6250p_firmwarewcn3990qcs610sd_675sdm429wqca6564ausd7c_firmwarecsrb31024sdx24sdx55m_firmwaresdm429w_firmwarewcn3950_firmwarewcd9380qca6420_firmwareqca6595au_firmwaresm6250pqca6335qcs410sd730_firmwarewcd9370sd_675_firmwaresd675_firmwaresdx50m_firmwareqca6174asdx24_firmwarewcn3990_firmwareqca6310_firmwareqca6430_firmwareqca9377sa415mwcn3998wcn3980wcd9371_firmwareqca6335_firmwarewcn3950sd720gwcd9340_firmwarewcn3660bsd855wsa8815sd7cwcn3660b_firmwareqca6574au_firmwaresdx55_firmwareqca6595auwcd9375_firmwarewcn3998_firmwaresd850_firmwarewcn3980_firmwaresd730sdx55mqca6420aqt1000_firmwareqca6564au_firmwareqca6310sd678_firmwaresd429csrb31024_firmwaresdx50msa415m_firmwarewcn3988_firmwareqca6430qca6574ausd429_firmwaresm6250wcd9340wsa8810_firmwarewcd9341_firmwarewsa8810qcs610_firmwareqca6174a_firmwarewcd9341qca6696_firmwarewcd9371qca6696wcd9375sd845_firmwareaqt1000wcd9370_firmwaresm6250_firmwaresdx55sd675sd845sd855_firmwarewcn3620_firmwarewcn3988wsa8815_firmwarewcn3620sd720g_firmwareqcs410_firmwaresd850Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
Details not found