Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2024-12673 |
CWE-ID | CWE-269 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Lenovo V Series Gen 5 Hardware solutions / Firmware ThinkBook 14 Gen 6 Hardware solutions / Firmware ThinkBook 14 Gen 7 Hardware solutions / Firmware ThinkBook 16 Gen 6 Hardware solutions / Firmware ThinkBook 16 Gen 7 Hardware solutions / Firmware ThinkPad E Series Gen 1 Hardware solutions / Firmware Vantage Client/Desktop applications / Other client software |
Vendor | Lenovo |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU109264
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-12673
CWE-ID:
CWE-269 - Improper Privilege Management
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to improper privilege management in a BIOS customization feature of Lenovo Vantage on SMB notebook devices. A local user can execute arbitrary code with elevated privileges.
Install updates from vendor's website.
Note, this vulnerability only affects Vantage installed on these devices:
Lenovo V Series Gen 5: All versions
ThinkBook 14 Gen 6: All versions
ThinkBook 14 Gen 7: All versions
ThinkBook 16 Gen 6: All versions
ThinkBook 16 Gen 7: All versions
ThinkPad E Series Gen 1: All versions
Vantage: before 10.2501.15.0
CPE2.3https://support.lenovo.com/us/en/product_security/LEN-183176
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.