Known vulnerabilities in Lenovo IdeaPad Pro 5 16APH8

CSH
CYBERSECURITY HELP
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
[] 
Main › Vulnerability Database › Lenovo › IdeaPad Pro 5 16APH8

Known vulnerabilities in Lenovo IdeaPad Pro 5 16APH8

Vendor: Lenovo
Website: https://www.lenovo.com/
Total Security Bulletins: 13

Security bulletins (13)

Secuity bulletin Severity Status Published
SB2025122708: Lenovo update for TianoCore EDK II BIOS Low
Patched
27.12.2025
SB2025122701: Lenovo update for multi-vendor BIOS Low
Patched
27.12.2025
SB2025072845: Lenovo update for TPM 2.0 Reference code vulnerability Low
Patched
28.07.2025
SB2025072844: Lenovo update for multi-vendor BIOS Low
Patched
28.07.2025
SB2025072837: Out-of-bounds write in Leovo MediaTek WLAN driver High
Patched
28.07.2025
SB2025052119: Lenovo update for NVIDIA GPU Display Driver (February 2024) Medium
Patched
21.05.2025
SB2025052108: Lenovo update for AMD Graphics driver Low
Patched
21.05.2025
SB20250520146: Lenovo update for NVIDIA GPU Display driver (July 2024) Low
Patched
20.05.2025
SB20250520135: Lenovo update for NVIDIA GPU Display Driver Low
Patched
20.05.2025
SB2025051631: Lenovo update for Intel VPL software and Graphics drivers Low
Patched
16.05.2025
SB2025051575: Lenovo update for Intel Arc GPU Low
Patched
15.05.2025
SB2025051524: Lenovo update for Intel Display Driver for Windows Low
Patched
15.05.2025
SB2023120689: Lenovo update for BIOS Image Parsing vulnerabilities (LogoFAIL) Low
Patched
06.12.2023


Terms of Use|Privacy Policy|Contacts

© 2026 Cybersecurity Help s.r.o.


Cookie Settings

We use cookies to enhance your browsing experience, serve personalized content, and analyze our traffic.

Necessary

Required for basic site functionality

Google Analytics

Helps us understand how visitors use our site

Learn more in our Privacy Policy

Please verify you're human

Complete the CAPTCHA below or accept cookies to continue browsing.

or