SB2026011319 - Multiple vulnerabilities in Lenovo Idea Tab Pro
Published: January 13, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 16 secuirty vulnerabilities.
1) Stack-based buffer overflow (CVE-ID: CVE-2025-20718)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to an incorrect bounds check within wlan. A local application can execute arbitrary code.
2) Out-of-bounds read (CVE-ID: CVE-2025-20724)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to an incorrect bounds check within wlan. A local application can gain access to sensitive information.
3) Out-of-bounds write (CVE-ID: CVE-2025-20723)
The vulnerability allows a local application to perform service disruption.
The vulnerability exists due to an incorrect bounds check within gnss. A local application can perform service disruption.
4) Integer overflow (CVE-ID: CVE-2025-20722)
The vulnerability allows a local application to perform service disruption.
The vulnerability exists due to an integer overflow within gnss. A local application can perform service disruption.
5) Out-of-bounds write (CVE-ID: CVE-2025-20721)
The vulnerability allows a local application to perform service disruption.
The vulnerability exists due to a missing bounds check within imgsensor. A local application can perform service disruption.
6) Heap-based Buffer Overflow (CVE-ID: CVE-2025-20720)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to an incorrect bounds check within wlan. A local application can execute arbitrary code.
7) Stack-based buffer overflow (CVE-ID: CVE-2025-20719)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to an incorrect bounds check within wlan. A local application can execute arbitrary code.
8) Stack-based buffer overflow (CVE-ID: CVE-2025-20717)
The vulnerability allows a local application to perform service disruption.
The vulnerability exists due to an incorrect bounds check within wlan. A local application can perform service disruption.
9) Buffer overflow (CVE-ID: CVE-2025-20709)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to an incorrect bounds check within wlan. A local application can execute arbitrary code.
10) Out-of-bounds write (CVE-ID: CVE-2025-20716)
The vulnerability allows a local application to perform service disruption.
The vulnerability exists due to an incorrect bounds check within wlan. A local application can perform service disruption.
11) Out-of-bounds write (CVE-ID: CVE-2025-20715)
The vulnerability allows a local application to perform service disruption.
The vulnerability exists due to an incorrect bounds check within wlan. A local application can perform service disruption.
12) Stack-based buffer overflow (CVE-ID: CVE-2025-20714)
The vulnerability allows a local application to perform service disruption.
The vulnerability exists due to an incorrect bounds check within wlan. A local application can perform service disruption.
13) Stack-based buffer overflow (CVE-ID: CVE-2025-20713)
The vulnerability allows a local application to perform service disruption.
The vulnerability exists due to an incorrect bounds check within wlan. A local application can perform service disruption.
14) Heap-based Buffer Overflow (CVE-ID: CVE-2025-20712)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to an incorrect bounds check within wlan. A local application can execute arbitrary code.
15) Improper Validation of Specified Type of Input (CVE-ID: CVE-2025-20711)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to an incorrect bounds check within wlan. A local application can execute arbitrary code.
16) Integer overflow (CVE-ID: CVE-2025-20710)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to an integer overflow within wlan. A local application can execute arbitrary code.
Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.