SB2025072844 - Lenovo update for multi-vendor BIOS
Published: July 28, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 7 secuirty vulnerabilities.
1) Information exposure through microarchitectural state after transient execution (CVE-ID: CVE-2024-36348)
The vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to information leak. A local user process can infer the control registers speculatively even if UMIP[3] feature is enabled, potentially resulting in information leakage.
2) Information exposure through microarchitectural state after transient execution (CVE-ID: CVE-2024-36349)
The vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to information leak. A local user process can infer TSC_AUX even when such a read is disabled, potentially resulting in information leakage.
3) Information exposure through microarchitectural state after transient execution (CVE-ID: CVE-2024-36350)
The vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to information leak. A local user can obtain sensitive data from previous stores.
4) Information exposure through microarchitectural state after transient execution (CVE-ID: CVE-2024-36357)
The vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to information leak. A local user can obtain sensitive data from the L1D cache.
5) Improper restriction of software interfaces to hardware features (CVE-ID: CVE-2024-48869)
The vulnerability allows a local administrator to escalate privileges on the system.
The vulnerability exists due to improper restriction of software interfaces to hardware features when using Intel TDX or SGX, which leads to security restrictions bypass and privilege escalation.
6) Insufficient Control Flow Management (CVE-ID: CVE-2025-20004)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to insufficient control flow management in the Alias Checking Trusted Module. A local administrator can gain elevated privileges on the target system.
7) Improper access control (CVE-ID: CVE-2025-20100)
The vulnerability allows a local user to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions in the memory controller configurations. A local administrator can bypass implemented security restrictions and gain elevated privileges on the target system.
Remediation
Install update from vendor's website.