Lenovo update for Intel CST software



Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2024-29076
CWE-ID CWE-248
Exploitation vector Local
Public exploit N/A
Vulnerable software
ThinkCentre Neo 50a 24 Gen 4
Hardware solutions / Firmware

ThinkCentre Neo 50a 24 Gen 3
Hardware solutions / Firmware

Intel Context Sensing Technology Service Driver for Windows 11 (Version 21H2 or Later) - ThinkCentre Neo 50a 24 Gen 4
Hardware solutions / Drivers

Intel Context Sensing Technology Service Driver for Windows 10 (64-bit) - ThinkCentre Neo 50a 24 Gen 3
Hardware solutions / Drivers

Intel Context Sensing Technology Service Driver for Windows 11 (Version 21H2 or Later) - ThinkCentre Neo 50a 24 Gen 3
Hardware solutions / Drivers

Vendor Lenovo

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Uncaught Exception

EUVDB-ID: #VU100416

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-29076

CWE-ID: CWE-248 - Uncaught Exception

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to uncaught exception. A local user can pass specially crafted input to the application and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

ThinkCentre Neo 50a 24 Gen 4: All versions

ThinkCentre Neo 50a 24 Gen 3: All versions

Intel Context Sensing Technology Service Driver for Windows 11 (Version 21H2 or Later) - ThinkCentre Neo 50a 24 Gen 4: before 2.1.10301.11

Intel Context Sensing Technology Service Driver for Windows 10 (64-bit) - ThinkCentre Neo 50a 24 Gen 3: before 2.1.10301.11

Intel Context Sensing Technology Service Driver for Windows 11 (Version 21H2 or Later) - ThinkCentre Neo 50a 24 Gen 3: before 2.1.10301.11

CPE2.3 External links

https://support.lenovo.com/us/en/product_security/LEN-167702


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###