5 results (0.003 seconds)

CVSS: 6.7EPSS: 0%CPEs: 598EXPL: 0

A buffer overflow in the WMI SMI Handler in some Lenovo models may allow an attacker with local access and elevated privileges to execute arbitrary code. • https://support.lenovo.com/us/en/product_security/LEN-94953 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.2EPSS: 0%CPEs: 106EXPL: 0

A potential vulnerability in the SMI callback function used in the SMBIOS event log driver in some Lenovo Desktop, ThinkStation, and ThinkEdge models may allow an attacker with local access and elevated privileges to execute arbitrary code. Una posible vulnerabilidad en la función de devolución de llamada SMI usada en el controlador de registro de eventos SMBIOS en algunos modelos de Lenovo Desktop, ThinkStation y ThinkEdge puede permitir a un atacante con acceso local y altos privilegios ejecutar código arbitrario • https://support.lenovo.com/us/en/product_security/LEN-77639 • CWE-20: Improper Input Validation •

CVSS: 7.2EPSS: 0%CPEs: 64EXPL: 0

A potential vulnerability in the SMI callback function used in the NVME driver in some Lenovo Desktop, ThinkStation, and ThinkEdge models may allow an attacker with local access and elevated privileges to execute arbitrary code. Una posible vulnerabilidad en la función de devolución de llamada SMI usada en el controlador NVME en algunos modelos Lenovo Desktop, ThinkStation y ThinkEdge puede permitir a un atacante con acceso local y altos privilegios ejecutar código arbitrario • https://support.lenovo.com/us/en/product_security/LEN-77639 • CWE-20: Improper Input Validation •

CVSS: 7.2EPSS: 0%CPEs: 40EXPL: 0

A potential vulnerability in the SMI callback function that saves and restore boot script tables used for resuming from sleep state in some ThinkCentre and ThinkStation models may allow an attacker with local access and elevated privileges to execute arbitrary code. Una posible vulnerabilidad en la función SMI callback que guarda y restaura las tablas de scripts de arranque usadas para reanudar desde el estado de suspensión en algunos modelos ThinkCentre y ThinkStation puede permitir a un atacante con acceso local y privilegios elevados ejecutar código arbitrario • https://support.lenovo.com/us/en/product_security/LEN-67440 • CWE-20: Improper Input Validation •

CVSS: 7.2EPSS: 0%CPEs: 222EXPL: 0

A vulnerability has been identified in some Lenovo products that use UEFI (BIOS) code developed by American Megatrends, Inc. (AMI). With this vulnerability, conditions exist where an attacker with administrative privileges or physical access to a system may be able to run specially crafted code that can allow them to bypass system protections such as Device Guard and Hyper-V. Se ha identificado una vulnerabilidad en algunos productos Lenovo que emplean código UEFI (BIOS) desarrollado por American Megatrends, Inc. (AMI). • https://support.lenovo.com/us/en/product_security/LEN-14695 • CWE-94: Improper Control of Generation of Code ('Code Injection') •