5 results (0.009 seconds)

CVSS: 6.7EPSS: 0%CPEs: 346EXPL: 0

A potential vulnerability in the SMI callback function used in the System Lock Preinstallation driver in some Lenovo Notebook and ThinkStation models may allow arbitrary code execution. Una potencial vulnerabilidad en la función de devolución de llamada SMI usada en el controlador System Lock Preinstallation en algunos modelos Lenovo Notebook y ThinkStation, puede permitir una ejecución de código arbitraria • https://support.lenovo.com/us/en/product_security/LEN-30042 •

CVSS: 5.5EPSS: 0%CPEs: 364EXPL: 0

Lenovo was notified of a potential denial of service vulnerability, affecting various versions of BIOS for Lenovo Desktop, Desktop - All in One, and ThinkStation, that could cause PCRs to be cleared intermittently after resuming from sleep (S3) on systems with Intel TXT enabled. Lenovo fue notificado de una potencial vulnerabilidad de denegación de servicio, que afecta a varias versiones de la BIOS para Lenovo Desktop, Desktop - All in One y ThinkStation, lo que podría causar que los PCR sean borrados de forma intermitente después de reanudar el modo de suspensión (S3) en sistemas con Intel TXT habilitado. • https://exchange.xforce.ibmcloud.com/vulnerabilities/176178 https://support.lenovo.com/us/en/product_security/LEN-28078 • CWE-665: Improper Initialization •

CVSS: 7.3EPSS: 0%CPEs: 9EXPL: 0

Improper permissions in the installer for Intel(R) Turbo Boost Max Technology 3.0 driver version 1.0.0.1035 and before may allow an authenticated user to potentially enable escalation of privilege via local access. Los permisos inapropiados en el instalador para el controlador versión 1.0.0.1035 y anteriores de Turbo Boost Max Technology de Intel® versión 3.0, pueden permitir que un usuario autenticado habilite potencialmente la escalada de privilegios por medio del acceso local. • http://www.securityfocus.com/bid/108770 https://support.lenovo.com/us/en/product_security/LEN-27841 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 3.3EPSS: 0%CPEs: 356EXPL: 0

In Lenovo systems, SMM BIOS Write Protection is used to prevent writes to SPI Flash. While this provides sufficient protection, an additional layer of protection is provided by SPI Protected Range Registers (PRx). Lenovo was notified that after resuming from S3 sleep mode in various versions of BIOS for Lenovo systems, the PRx is not set. This does not impact the SMM BIOS Write Protection, which keeps systems protected. En los sistemas Lenovo, SMM BIOS Write Protection se utiliza para evitar la escritura en SPI Flash. • https://support.lenovo.com/solutions/LEN-26332 • CWE-667: Improper Locking •

CVSS: 7.2EPSS: 0%CPEs: 222EXPL: 0

A vulnerability has been identified in some Lenovo products that use UEFI (BIOS) code developed by American Megatrends, Inc. (AMI). With this vulnerability, conditions exist where an attacker with administrative privileges or physical access to a system may be able to run specially crafted code that can allow them to bypass system protections such as Device Guard and Hyper-V. Se ha identificado una vulnerabilidad en algunos productos Lenovo que emplean código UEFI (BIOS) desarrollado por American Megatrends, Inc. (AMI). • https://support.lenovo.com/us/en/product_security/LEN-14695 • CWE-94: Improper Control of Generation of Code ('Code Injection') •