4 results (0.006 seconds)

CVSS: 7.2EPSS: 0%CPEs: 40EXPL: 0

A potential vulnerability in the SMI callback function that saves and restore boot script tables used for resuming from sleep state in some ThinkCentre and ThinkStation models may allow an attacker with local access and elevated privileges to execute arbitrary code. Una posible vulnerabilidad en la función SMI callback que guarda y restaura las tablas de scripts de arranque usadas para reanudar desde el estado de suspensión en algunos modelos ThinkCentre y ThinkStation puede permitir a un atacante con acceso local y privilegios elevados ejecutar código arbitrario • https://support.lenovo.com/us/en/product_security/LEN-67440 • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 0%CPEs: 54EXPL: 0

A potential vulnerability in the SMI callback function used in the EEPROM driver in some Lenovo Desktops and ThinkStation models may allow arbitrary code execution Una vulnerabilidad potencial en la función de devolución de llamada SMI usada en el controlador EEPROM en algunos modelos de Lenovo Desktops y ThinkStation puede permitir una ejecución de código arbitrario • https://support.lenovo.com/us/en/product_security/LEN-30042 •

CVSS: 5.5EPSS: 0%CPEs: 364EXPL: 0

Lenovo was notified of a potential denial of service vulnerability, affecting various versions of BIOS for Lenovo Desktop, Desktop - All in One, and ThinkStation, that could cause PCRs to be cleared intermittently after resuming from sleep (S3) on systems with Intel TXT enabled. Lenovo fue notificado de una potencial vulnerabilidad de denegación de servicio, que afecta a varias versiones de la BIOS para Lenovo Desktop, Desktop - All in One y ThinkStation, lo que podría causar que los PCR sean borrados de forma intermitente después de reanudar el modo de suspensión (S3) en sistemas con Intel TXT habilitado. • https://exchange.xforce.ibmcloud.com/vulnerabilities/176178 https://support.lenovo.com/us/en/product_security/LEN-28078 • CWE-665: Improper Initialization •

CVSS: 3.3EPSS: 0%CPEs: 356EXPL: 0

In Lenovo systems, SMM BIOS Write Protection is used to prevent writes to SPI Flash. While this provides sufficient protection, an additional layer of protection is provided by SPI Protected Range Registers (PRx). Lenovo was notified that after resuming from S3 sleep mode in various versions of BIOS for Lenovo systems, the PRx is not set. This does not impact the SMM BIOS Write Protection, which keeps systems protected. En los sistemas Lenovo, SMM BIOS Write Protection se utiliza para evitar la escritura en SPI Flash. • https://support.lenovo.com/solutions/LEN-26332 • CWE-667: Improper Locking •