SB2025072844 - Lenovo update for multi-vendor BIOS



SB2025072844 - Lenovo update for multi-vendor BIOS

Published: July 28, 2025

Security Bulletin ID SB2025072844
Severity
Low
Patch available
YES
Number of vulnerabilities 7
Exploitation vector Local access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 7 secuirty vulnerabilities.


1) Information exposure through microarchitectural state after transient execution (CVE-ID: CVE-2024-36348)

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to information leak. A local user process can infer the control registers speculatively even if UMIP[3] feature is enabled, potentially resulting in information leakage.


2) Information exposure through microarchitectural state after transient execution (CVE-ID: CVE-2024-36349)

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to information leak. A local user process can infer TSC_AUX even when such a read is disabled, potentially resulting in information leakage.


3) Information exposure through microarchitectural state after transient execution (CVE-ID: CVE-2024-36350)

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to information leak. A local user can obtain sensitive data from previous stores.


4) Information exposure through microarchitectural state after transient execution (CVE-ID: CVE-2024-36357)

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to information leak. A local user can obtain sensitive data from the L1D cache.


5) Improper restriction of software interfaces to hardware features (CVE-ID: CVE-2024-48869)

The vulnerability allows a local administrator to escalate privileges on the system.

The vulnerability exists due to improper restriction of software interfaces to hardware features when using Intel TDX or SGX, which leads to security restrictions bypass and privilege escalation.


6) Insufficient Control Flow Management (CVE-ID: CVE-2025-20004)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to insufficient control flow management in the Alias Checking Trusted Module. A local administrator can gain elevated privileges on the target system.


7) Improper access control (CVE-ID: CVE-2025-20100)

The vulnerability allows a local user to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions in the memory controller configurations. A local administrator can bypass implemented security restrictions and gain elevated privileges on the target system.


Remediation

Install update from vendor's website.