CVE-2021-3719 (GCVE-0-2021-3719)
Vulnerability from cvelistv5
Published
2021-11-12 22:05
Modified
2024-08-03 17:01
CWE
  • CWE-20 - Improper Input Validation
Summary
A potential vulnerability in the SMI callback function that saves and restore boot script tables used for resuming from sleep state in some ThinkCentre and ThinkStation models may allow an attacker with local access and elevated privileges to execute arbitrary code.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T17:01:07.776Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.lenovo.com/us/en/product_security/LEN-67440"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "ThinkCentre and ThinkStation BIOS",
          "vendor": "Lenovo",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Lenovo thanks Jiawei Yin(@yngweijw), Menghao Li, and Chengxi, Chen of IIE varas for reporting this issue."
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A potential vulnerability in the SMI callback function that saves and restore boot script tables used for resuming from sleep state in some ThinkCentre and ThinkStation models may allow an attacker with local access and elevated privileges to execute arbitrary code."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20 Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-12T22:05:36",
        "orgId": "da227ddf-6e25-4b41-b023-0f976dcaca4b",
        "shortName": "lenovo"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.lenovo.com/us/en/product_security/LEN-67440"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "Update system firmware to the version (or newer) indicated for your model in the Product Impact section in LEN-67440."
        }
      ],
      "source": {
        "advisory": "LEN-67440",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@lenovo.com",
          "ID": "CVE-2021-3719",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "ThinkCentre and ThinkStation BIOS",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "various"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Lenovo"
              }
            ]
          }
        },
        "credit": [
          {
            "lang": "eng",
            "value": "Lenovo thanks Jiawei Yin(@yngweijw), Menghao Li, and Chengxi, Chen of IIE varas for reporting this issue."
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A potential vulnerability in the SMI callback function that saves and restore boot script tables used for resuming from sleep state in some ThinkCentre and ThinkStation models may allow an attacker with local access and elevated privileges to execute arbitrary code."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-20 Improper Input Validation"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.lenovo.com/us/en/product_security/LEN-67440",
              "refsource": "MISC",
              "url": "https://support.lenovo.com/us/en/product_security/LEN-67440"
            }
          ]
        },
        "solution": [
          {
            "lang": "en",
            "value": "Update system firmware to the version (or newer) indicated for your model in the Product Impact section in LEN-67440."
          }
        ],
        "source": {
          "advisory": "LEN-67440",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "da227ddf-6e25-4b41-b023-0f976dcaca4b",
    "assignerShortName": "lenovo",
    "cveId": "CVE-2021-3719",
    "datePublished": "2021-11-12T22:05:36",
    "dateReserved": "2021-08-18T00:00:00",
    "dateUpdated": "2024-08-03T17:01:07.776Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2021-3719\",\"sourceIdentifier\":\"psirt@lenovo.com\",\"published\":\"2021-11-12T22:15:07.957\",\"lastModified\":\"2024-11-21T06:22:14.657\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A potential vulnerability in the SMI callback function that saves and restore boot script tables used for resuming from sleep state in some ThinkCentre and ThinkStation models may allow an attacker with local access and elevated privileges to execute arbitrary code.\"},{\"lang\":\"es\",\"value\":\"Una posible vulnerabilidad en la funci\u00f3n SMI callback que guarda y restaura las tablas de scripts de arranque usadas para reanudar desde el estado de suspensi\u00f3n en algunos modelos ThinkCentre y ThinkStation puede permitir a un atacante con acceso local y privilegios elevados ejecutar c\u00f3digo arbitrario\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@lenovo.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"psirt@lenovo.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:lenovo:thinkcentre_e93_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"fbktdfa\",\"matchCriteriaId\":\"F534F97A-0288-4015-8C8B-B98AE66CB812\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lenovo:thinkcentre_e93:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA9110B9-D4E6-4DEC-B0B9-DE4641117B54\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:lenovo:thinkcentre_m600_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"m00kt65a\",\"matchCriteriaId\":\"69F0297B-815E-4912-A23B-A4F38BB43BAF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lenovo:thinkcentre_m600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCA4E481-3FE3-4AC5-BDEA-EF0C667E331E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:lenovo:thinkcentre_m700_tiny_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"fwktb9a\",\"matchCriteriaId\":\"118DA580-F89C-40FF-930C-E974C13108EE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lenovo:thinkcentre_m700_tiny:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE20DD1E-5C2C-4253-B71E-529D699FB8D0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:lenovo:thinkcentre_m73_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"fhkt86a\",\"matchCriteriaId\":\"C5FA79F6-A8EF-4B91-9C11-F03DF14A4313\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lenovo:thinkcentre_m73:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FB24CE6-E1F1-4151-9228-61DCD08E9D01\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:lenovo:thinkcentre_m73p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"fbktdfa\",\"matchCriteriaId\":\"2BDBA965-81EB-4898-9C06-A8D917841553\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lenovo:thinkcentre_m73p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB7C0580-76A1-41C4-B743-96000853236B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:lenovo:thinkcentre_m800_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"fwktb9a\",\"matchCriteriaId\":\"4E0468FF-B7A5-4199-8A5A-CD26C7992EB2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lenovo:thinkcentre_m800:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B97FE070-E06D-433B-AAC9-A2460E404B94\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:lenovo:thinkcentre_m818z_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"m1ekt23a\",\"matchCriteriaId\":\"54C60F2A-20C6-44D9-AEF4-92CEBCAB1B6C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lenovo:thinkcentre_m818z:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37E62D35-9270-4959-A9C2-97E3F9F0719A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:lenovo:thinkcentre_m83_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"fbktdfa\",\"matchCriteriaId\":\"A37FFBD9-559D-4798-BFF5-94BD14EB0FD4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lenovo:thinkcentre_m83:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BB1BF39-4D09-4133-88CB-AD9E1271EFF0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:lenovo:thinkcentre_m900_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"fwktb9a\",\"matchCriteriaId\":\"5C6746A2-953E-4F8A-AEC7-0FD2CC688777\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lenovo:thinkcentre_m900:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADC80C43-18AF-433D-AA51-F473B8501329\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:lenovo:thinkcentre_m900x_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"fwktb9a\",\"matchCriteriaId\":\"94EB1312-08C4-4018-AEEA-6305716BF89C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lenovo:thinkcentre_m900x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"261F2F75-E0E4-4318-BB7B-065EC466D671\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:lenovo:thinkcentre_m93_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"fbktdfa\",\"matchCriteriaId\":\"F5C2FD29-75C8-46BE-878F-590A9DB316AF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lenovo:thinkcentre_m93:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6340A351-D5A0-46D2-BF97-412DD66BDE65\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:lenovo:thinkcentre_m93p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"fbktdfa\",\"matchCriteriaId\":\"58AA9D3A-6CB8-4715-8394-4573EE16E293\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lenovo:thinkcentre_m93p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11A2CF02-7D37-4C2A-ABB5-0F072BF7C739\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:lenovo:thinkcentre_m4500q_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"fhkt86a\",\"matchCriteriaId\":\"E375987D-4349-4285-856A-22D60E52523C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lenovo:thinkcentre_m4500q:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0B588AF-BB3E-4A22-8197-0450B307F38B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:lenovo:thinkcentre_m6500t\\\\/s_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"fbktdfa\",\"matchCriteriaId\":\"817002BF-7E5C-43EA-BA8A-28B1DC908CE7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lenovo:thinkcentre_m6500t\\\\/s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2BD6A2B-9A26-410E-A4D0-CCCCDECB7036\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:lenovo:thinkcentre_m8500t\\\\/s_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"fbktdfa\",\"matchCriteriaId\":\"328A37CD-78D2-4B20-AF44-CC1AD8395556\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lenovo:thinkcentre_m8500t\\\\/s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DC5D34D-72DB-455E-9A01-9066BE4D3670\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:lenovo:thinkcentre_x1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"m0hkt50a\",\"matchCriteriaId\":\"75BA83EE-4F80-499B-9634-E350088D87D5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lenovo:thinkcentre_x1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62066C05-06E3-4443-B217-98FB5038FCA4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:lenovo:thinkstation_p300_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"fbktdfa\",\"matchCriteriaId\":\"8618E20B-AF94-47FD-86EC-C661DE63FEF6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lenovo:thinkstation_p300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDCE0A0B-C9EB-402A-B43B-6B7670E2BF73\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:lenovo:thinkstation_p500_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"a4ktaba\",\"matchCriteriaId\":\"D7D7EE98-676F-474A-BBBF-E71B128FBCB8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lenovo:thinkstation_p500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4CA9A54-00A0-4569-9AE0-6AE02A039600\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:lenovo:thinkstation_p700_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"a5ktaba\",\"matchCriteriaId\":\"F2D8F272-C7C2-45BC-B83F-0430A6CB6AEA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lenovo:thinkstation_p700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA54FF9E-3B77-4B09-A77B-D7F522A69326\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:lenovo:thinkstation_p900_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"a6ktaba\",\"matchCriteriaId\":\"F06F1ABF-130E-416F-993B-25E3F6832B72\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lenovo:thinkstation_p900:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FB1B208-2854-4F95-BAB0-661442FEC477\"}]}]}],\"references\":[{\"url\":\"https://support.lenovo.com/us/en/product_security/LEN-67440\",\"source\":\"psirt@lenovo.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.lenovo.com/us/en/product_security/LEN-67440\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…