Page 2 of 10 results (0.003 seconds)

CVSS: 7.8EPSS: 0%CPEs: 240EXPL: 0

Incorrect parameter validation in the synaTee component of Synaptics WBF drivers using an SGX enclave (all versions prior to 2019-11-15) allows a local user to execute arbitrary code in the enclave (that can compromise confidentiality of enclave data) via APIs that accept invalid pointers. Una comprobación incorrecta de parámetros en el componente synaTee de los controladores Synaptics WBF que usan un enclave SGX (todas las versiones anteriores al 15/11/2019) permite a un usuario local ejecutar código arbitrario en el enclave (que puede comprometer la confidencialidad de los datos de enclave) por medio de una API que aceptan punteros no válidos • https://support.hp.com/hk-en/document/c06696568 https://support.lenovo.com/us/en/product_security/LEN-31372 https://www.synaptics.com/company/blog https://www.synaptics.com/sites/default/files/fingerprint-driver-SGX-security-brief-2020-07-14.pdf https://www.syssec.wiwi.uni-due.de/en/research/research-projects/analysis-of-tee-software • CWE-763: Release of Invalid Pointer or Reference •

CVSS: 6.7EPSS: 0%CPEs: 346EXPL: 0

A potential vulnerability in the SMI callback function used in the Legacy SD driver in some Lenovo ThinkPad, ThinkStation, and Lenovo Notebook models may allow arbitrary code execution. Una potencial vulnerabilidad en la función de devolución de llamada SMI usada en el controlador Legacy SD en algunos modelos Lenovo ThinkPad, ThinkStation y Lenovo Notebook, lo que puede permitir una ejecución de código arbitraria • https://support.lenovo.com/us/en/product_security/LEN-30042 •

CVSS: 6.8EPSS: 0%CPEs: 202EXPL: 0

An internal shell was included in BIOS image in some ThinkPad models that could allow escalation of privilege. Un shell interno fue incluido en la imagen del BIOS en algunos modelos de ThinkPad que podría permitir una escalada de privilegios • https://support.lenovo.com/us/en/product_security/LEN-30042 • CWE-269: Improper Privilege Management CWE-489: Active Debug Code •

CVSS: 3.3EPSS: 0%CPEs: 356EXPL: 0

In Lenovo systems, SMM BIOS Write Protection is used to prevent writes to SPI Flash. While this provides sufficient protection, an additional layer of protection is provided by SPI Protected Range Registers (PRx). Lenovo was notified that after resuming from S3 sleep mode in various versions of BIOS for Lenovo systems, the PRx is not set. This does not impact the SMM BIOS Write Protection, which keeps systems protected. En los sistemas Lenovo, SMM BIOS Write Protection se utiliza para evitar la escritura en SPI Flash. • https://support.lenovo.com/solutions/LEN-26332 • CWE-667: Improper Locking •

CVSS: 7.2EPSS: 0%CPEs: 101EXPL: 0

In some Lenovo ThinkPad products, one BIOS region is not properly included in the checks, allowing injection of arbitrary code. En algunos ThinkPads de Lenovo, una región de BIOS no se incluye correctamente en las comprobaciones, lo que permite la inyección de código arbitrario. • http://www.securityfocus.com/bid/105387 https://support.lenovo.com/us/en/solutions/LEN-20527 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •