#VU73734 Security features bypass in Lenovo Hardware solutions


Published: 2023-03-15

Vulnerability identifier: #VU73734

Vulnerability risk: Low

CVSSv3.1: 6.6 [CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-4575

CWE-ID: CWE-254

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
ThinkPad X260
Hardware solutions / Firmware
ThinkPad 25 20K7
Hardware solutions / Firmware
ThinkPad L560
Hardware solutions / Firmware
ThinkPad P50
Hardware solutions / Firmware
ThinkPad P50s
Hardware solutions / Firmware
ThinkPad P70
Hardware solutions / Firmware
ThinkPad T470 20HD
Hardware solutions / Firmware
ThinkPad T470 20HE
Hardware solutions / Firmware
ThinkPad T470 20JM
Hardware solutions / Firmware
ThinkPad T470 20JN
Hardware solutions / Firmware
ThinkPad T470s 20HF
Hardware solutions / Firmware
ThinkPad T470s 20HG
Hardware solutions / Firmware
ThinkPad T470s 20JS
Hardware solutions / Firmware
ThinkPad T470s 20JT
Hardware solutions / Firmware
ThinkPad T560
Hardware solutions / Firmware
ThinkPad X1 Carbon 4th Gen 20FB
Hardware solutions / Firmware
ThinkPad X1 Carbon 4th Gen 20FC
Hardware solutions / Firmware
ThinkPad X1 Yoga 1st Gen 20FQ
Hardware solutions / Firmware
ThinkPad X1 Yoga 1st Gen 20FR
Hardware solutions / Firmware
ThinkPad X270 20HN
Hardware solutions / Firmware
ThinkPad X270 20HM
Hardware solutions / Firmware
ThinkPad X270 20K6
Hardware solutions / Firmware
ThinkPad X270 20K5
Hardware solutions / Firmware
ThinkPad Yoga 260
Hardware solutions / Firmware

Vendor: Lenovo

Description

The vulnerability allows an attacker to bypass implemented security restrictions.

The vulnerability exists due to improper write protection of UEFI variables. An attacker with physical access to device can bypass the Secure Boot mechanism and compromise the affected system.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

ThinkPad X260: All versions


External links
http://support.lenovo.com/us/en/product_security/LEN-106014


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability