8 results (0.006 seconds)

CVSS: 2.4EPSS: 0%CPEs: 32EXPL: 0

11 Nov 2020 — In some Lenovo Desktop models, the Configuration Change Detection BIOS setting failed to detect SATA configuration changes. En algunos modelos Lenovo Desktop, la configuración Configuration Change Detection BIOS no pudo detectar cambios de configuración SATA • https://support.lenovo.com/us/en/product_security/LEN-49266 • CWE-358: Improperly Implemented Security Check for Standard •

CVSS: 7.8EPSS: 0%CPEs: 54EXPL: 0

24 Sep 2020 — A potential vulnerability in the SMI callback function used in the EEPROM driver in some Lenovo Desktops and ThinkStation models may allow arbitrary code execution Una vulnerabilidad potencial en la función de devolución de llamada SMI usada en el controlador EEPROM en algunos modelos de Lenovo Desktops y ThinkStation puede permitir una ejecución de código arbitrario • https://support.lenovo.com/us/en/product_security/LEN-30042 •

CVSS: 5.5EPSS: 0%CPEs: 364EXPL: 0

14 Feb 2020 — Lenovo was notified of a potential denial of service vulnerability, affecting various versions of BIOS for Lenovo Desktop, Desktop - All in One, and ThinkStation, that could cause PCRs to be cleared intermittently after resuming from sleep (S3) on systems with Intel TXT enabled. Lenovo fue notificado de una potencial vulnerabilidad de denegación de servicio, que afecta a varias versiones de la BIOS para Lenovo Desktop, Desktop - All in One y ThinkStation, lo que podría causar que los PCR sean borrados de fo... • https://exchange.xforce.ibmcloud.com/vulnerabilities/176178 • CWE-665: Improper Initialization •

CVSS: 9.8EPSS: 0%CPEs: 786EXPL: 0

12 Nov 2019 — The BIOS tamper detection mechanism was not triggered in Lenovo ThinkPad T460p, BIOS versions up to R07ET90W, and T470p, BIOS versions up to R0FET50W, which may allow for unauthorized access. El mecanismo de detección de manipulación del BIOS no se activó en Lenovo ThinkPad T460p, versiones de BIOS hasta R07ET90W, y T470p, versiones de BIOS hasta R0FET50W, lo que puede permitir el acceso no autorizado. • https://support.lenovo.com/us/en/product_security/LEN-27714 •

CVSS: 6.4EPSS: 0%CPEs: 786EXPL: 0

12 Nov 2019 — A potential vulnerability in the SMI callback function used in the Legacy USB driver using boot services structure in runtime phase in some Lenovo ThinkPad models may allow arbitrary code execution. Una posible vulnerabilidad en la función de devolución de llamada SMI utilizada en el controlador USB heredado que utiliza la estructura de servicios de arranque en fase de ejecución en algunos modelos de ThinkPad de Lenovo puede permitir la ejecución de códigos arbitrarios • https://support.lenovo.com/us/en/product_security/LEN-27714 •

CVSS: 6.4EPSS: 0%CPEs: 786EXPL: 0

12 Nov 2019 — A potential vulnerability in the SMI callback function used in Legacy USB driver using passed parameter without sufficient checking in some Lenovo ThinkPad models may allow arbitrary code execution. Una posible vulnerabilidad en la función de retrollamada SMI utilizada en el controlador USB heredado que utiliza el parámetro de paso sin suficiente comprobación en algunos modelos de ThinkPad de Lenovo puede permitir la ejecución de códigos arbitrarios • https://support.lenovo.com/us/en/product_security/LEN-27714 •

CVSS: 3.3EPSS: 0%CPEs: 356EXPL: 0

10 Apr 2019 — In Lenovo systems, SMM BIOS Write Protection is used to prevent writes to SPI Flash. While this provides sufficient protection, an additional layer of protection is provided by SPI Protected Range Registers (PRx). Lenovo was notified that after resuming from S3 sleep mode in various versions of BIOS for Lenovo systems, the PRx is not set. This does not impact the SMM BIOS Write Protection, which keeps systems protected. En los sistemas Lenovo, SMM BIOS Write Protection se utiliza para evitar la escritura en... • https://support.lenovo.com/solutions/LEN-26332 • CWE-667: Improper Locking •

CVSS: 7.2EPSS: 0%CPEs: 222EXPL: 0

10 Aug 2017 — A vulnerability has been identified in some Lenovo products that use UEFI (BIOS) code developed by American Megatrends, Inc. (AMI). With this vulnerability, conditions exist where an attacker with administrative privileges or physical access to a system may be able to run specially crafted code that can allow them to bypass system protections such as Device Guard and Hyper-V. Se ha identificado una vulnerabilidad en algunos productos Lenovo que emplean código UEFI (BIOS) desarrollado por American Megatrends... • https://support.lenovo.com/us/en/product_security/LEN-14695 • CWE-94: Improper Control of Generation of Code ('Code Injection') •