Page 5 of 24 results (0.003 seconds)

CVSS: 7.8EPSS: 0%CPEs: 244EXPL: 0

An ErrorMessage driver stack-based buffer overflow vulnerability in BIOS of some ThinkPad models could allow an attacker with local access to elevate their privileges and execute arbitrary code. • https://support.lenovo.com/us/en/product_security/LEN-124495 • CWE-787: Out-of-bounds Write •

CVSS: 4.4EPSS: 0%CPEs: 300EXPL: 0

An information leak vulnerability in SMI Handler used to configure platform settings over WMI in some Lenovo models may allow an attacker with local access and elevated privileges to read SMM memory. • https://support.lenovo.com/us/en/product_security/LEN-94953 • CWE-125: Out-of-bounds Read •

CVSS: 6.9EPSS: 0%CPEs: 128EXPL: 0

A vulnerability was reported in some Lenovo Desktop models that could allow unauthorized access to the boot menu, when the "BIOS Password At Boot Device List" BIOS setting is Yes. Se ha informado de una vulnerabilidad en algunos modelos de ordenadores de sobremesa de Lenovo que podía permitir el acceso no autorizado al menú de arranque, cuando la configuración de la BIOS "BIOS Password At Boot Device List" es Sí • https://support.lenovo.com/us/en/product_security/LEN-67440 • CWE-287: Improper Authentication •

CVSS: 6.7EPSS: 0%CPEs: 28EXPL: 1

Prior to August 10, 2020, some Lenovo Desktop and Workstation systems were shipped with the Embedded Host Based Configuration (EHBC) feature of Intel AMT enabled. This could allow an administrative user with local access to configure Intel AMT. Antes del 10 de agosto de 2020, algunos sistemas Lenovo Desktop y Workstation se enviaron con la funcionalidad Embedded Host Based Configuration (EHBC) de Intel AMT habilitada. Esto podría permitir a un usuario administrativo acceso local para configurar Intel AMT • https://support.lenovo.com/us/en/product_security/LEN-44725 • CWE-16: Configuration •