Vulnerabilites related to lenovo - yoga
CVE-2019-6167 (GCVE-0-2019-6167)
Vulnerability from cvelistv5
- remote code execution
▼ | URL | Tags |
---|---|---|
https://support.lenovo.com/solutions/LEN-27725 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
Lenovo | Service Bridge |
Version: unspecified < 4.1.0.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:16:24.512Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.lenovo.com/solutions/LEN-27725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Service Bridge", "vendor": "Lenovo", "versions": [ { "lessThan": "4.1.0.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Lenovo would like to thank Bill Demirkapi for reporting this issue." } ], "datePublic": "2019-06-25T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability reported in Lenovo Service Bridge before version 4.1.0.1 could allow remote code execution." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "remote code execution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-06-26T14:12:34", "orgId": "da227ddf-6e25-4b41-b023-0f976dcaca4b", "shortName": "lenovo" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.lenovo.com/solutions/LEN-27725" } ], "solutions": [ { "lang": "en", "value": "Upgrade to Lenovo Service Bridge version 4.1.0.1 (or newer)." } ], "source": { "advisory": "LEN-27725", "discovery": "UNKNOWN" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@lenovo.com", "DATE_PUBLIC": "2019-06-25T16:00:00.000Z", "ID": "CVE-2019-6167", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Service Bridge", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "4.1.0.1" } ] } } ] }, "vendor_name": "Lenovo" } ] } }, "credit": [ { "lang": "eng", "value": "Lenovo would like to thank Bill Demirkapi for reporting this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability reported in Lenovo Service Bridge before version 4.1.0.1 could allow remote code execution." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "remote code execution" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.lenovo.com/solutions/LEN-27725", "refsource": "MISC", "url": "https://support.lenovo.com/solutions/LEN-27725" } ] }, "solution": [ { "lang": "en", "value": "Upgrade to Lenovo Service Bridge version 4.1.0.1 (or newer)." } ], "source": { "advisory": "LEN-27725", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "da227ddf-6e25-4b41-b023-0f976dcaca4b", "assignerShortName": "lenovo", "cveId": "CVE-2019-6167", "datePublished": "2019-06-26T14:12:34.783642Z", "dateReserved": "2019-01-11T00:00:00", "dateUpdated": "2024-09-16T17:02:52.749Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-6169 (GCVE-0-2019-6169)
Vulnerability from cvelistv5
- unencrypted downloads over FTP
▼ | URL | Tags |
---|---|---|
https://support.lenovo.com/solutions/LEN-27725 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
Lenovo | Service Bridge |
Version: unspecified < 4.1.0.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:16:24.523Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.lenovo.com/solutions/LEN-27725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Service Bridge", "vendor": "Lenovo", "versions": [ { "lessThan": "4.1.0.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Lenovo would like to thank Bill Demirkapi for reporting this issue." } ], "datePublic": "2019-06-25T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability reported in Lenovo Service Bridge before version 4.1.0.1 could allow unencrypted downloads over FTP." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "unencrypted downloads over FTP", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-06-26T14:12:34", "orgId": "da227ddf-6e25-4b41-b023-0f976dcaca4b", "shortName": "lenovo" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.lenovo.com/solutions/LEN-27725" } ], "solutions": [ { "lang": "en", "value": "Upgrade to Lenovo Service Bridge version 4.1.0.1 (or newer)." } ], "source": { "advisory": "LEN-27725", "discovery": "UNKNOWN" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@lenovo.com", "DATE_PUBLIC": "2019-06-25T16:00:00.000Z", "ID": "CVE-2019-6169", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Service Bridge", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "4.1.0.1" } ] } } ] }, "vendor_name": "Lenovo" } ] } }, "credit": [ { "lang": "eng", "value": "Lenovo would like to thank Bill Demirkapi for reporting this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability reported in Lenovo Service Bridge before version 4.1.0.1 could allow unencrypted downloads over FTP." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "unencrypted downloads over FTP" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.lenovo.com/solutions/LEN-27725", "refsource": "MISC", "url": "https://support.lenovo.com/solutions/LEN-27725" } ] }, "solution": [ { "lang": "en", "value": "Upgrade to Lenovo Service Bridge version 4.1.0.1 (or newer)." } ], "source": { "advisory": "LEN-27725", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "da227ddf-6e25-4b41-b023-0f976dcaca4b", "assignerShortName": "lenovo", "cveId": "CVE-2019-6169", "datePublished": "2019-06-26T14:12:34.865362Z", "dateReserved": "2019-01-11T00:00:00", "dateUpdated": "2024-09-16T20:32:51.243Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-6168 (GCVE-0-2019-6168)
Vulnerability from cvelistv5
- remote code execution
▼ | URL | Tags |
---|---|---|
https://support.lenovo.com/solutions/LEN-27725 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
Lenovo | Service Bridge |
Version: unspecified < 4.1.0.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:16:24.577Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.lenovo.com/solutions/LEN-27725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Service Bridge", "vendor": "Lenovo", "versions": [ { "lessThan": "4.1.0.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Lenovo would like to thank Bill Demirkapi for reporting this issue." } ], "datePublic": "2019-06-25T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability reported in Lenovo Service Bridge before version 4.1.0.1 could allow remote code execution." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "remote code execution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-06-26T14:12:34", "orgId": "da227ddf-6e25-4b41-b023-0f976dcaca4b", "shortName": "lenovo" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.lenovo.com/solutions/LEN-27725" } ], "solutions": [ { "lang": "en", "value": "Upgrade to Lenovo Service Bridge version 4.1.0.1 (or newer)." } ], "source": { "advisory": "LEN-27725", "discovery": "UNKNOWN" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@lenovo.com", "DATE_PUBLIC": "2019-06-25T16:00:00.000Z", "ID": "CVE-2019-6168", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Service Bridge", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "4.1.0.1" } ] } } ] }, "vendor_name": "Lenovo" } ] } }, "credit": [ { "lang": "eng", "value": "Lenovo would like to thank Bill Demirkapi for reporting this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability reported in Lenovo Service Bridge before version 4.1.0.1 could allow remote code execution." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "remote code execution" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.lenovo.com/solutions/LEN-27725", "refsource": "MISC", "url": "https://support.lenovo.com/solutions/LEN-27725" } ] }, "solution": [ { "lang": "en", "value": "Upgrade to Lenovo Service Bridge version 4.1.0.1 (or newer)." } ], "source": { "advisory": "LEN-27725", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "da227ddf-6e25-4b41-b023-0f976dcaca4b", "assignerShortName": "lenovo", "cveId": "CVE-2019-6168", "datePublished": "2019-06-26T14:12:34.822409Z", "dateReserved": "2019-01-11T00:00:00", "dateUpdated": "2024-09-16T23:41:33.425Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-6166 (GCVE-0-2019-6166)
Vulnerability from cvelistv5
- cross-site request forgery
▼ | URL | Tags |
---|---|---|
https://support.lenovo.com/solutions/LEN-27725 | x_refsource_MISC |
Vendor | Product | Version | ||
---|---|---|---|---|
Lenovo | Service Bridge |
Version: unspecified < 4.1.0.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:16:24.730Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.lenovo.com/solutions/LEN-27725" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Service Bridge", "vendor": "Lenovo", "versions": [ { "lessThan": "4.1.0.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Lenovo would like to thank Bill Demirkapi for reporting this issue." } ], "datePublic": "2019-06-25T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability reported in Lenovo Service Bridge before version 4.1.0.1 could allow cross-site request forgery." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "cross-site request forgery", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-06-26T14:12:34", "orgId": "da227ddf-6e25-4b41-b023-0f976dcaca4b", "shortName": "lenovo" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.lenovo.com/solutions/LEN-27725" } ], "solutions": [ { "lang": "en", "value": "Upgrade to Lenovo Service Bridge version 4.1.0.1 (or newer)." } ], "source": { "advisory": "LEN-27725", "discovery": "UNKNOWN" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@lenovo.com", "DATE_PUBLIC": "2019-06-25T16:00:00.000Z", "ID": "CVE-2019-6166", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Service Bridge", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "4.1.0.1" } ] } } ] }, "vendor_name": "Lenovo" } ] } }, "credit": [ { "lang": "eng", "value": "Lenovo would like to thank Bill Demirkapi for reporting this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability reported in Lenovo Service Bridge before version 4.1.0.1 could allow cross-site request forgery." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "cross-site request forgery" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.lenovo.com/solutions/LEN-27725", "refsource": "MISC", "url": "https://support.lenovo.com/solutions/LEN-27725" } ] }, "solution": [ { "lang": "en", "value": "Upgrade to Lenovo Service Bridge version 4.1.0.1 (or newer)." } ], "source": { "advisory": "LEN-27725", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "da227ddf-6e25-4b41-b023-0f976dcaca4b", "assignerShortName": "lenovo", "cveId": "CVE-2019-6166", "datePublished": "2019-06-26T14:12:34.747569Z", "dateReserved": "2019-01-11T00:00:00", "dateUpdated": "2024-09-16T17:14:55.601Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
psirt@lenovo.com | https://support.lenovo.com/solutions/LEN-27725 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.lenovo.com/solutions/LEN-27725 | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
lenovo | service_bridge | * | |
lenovo | ideacentre | - | |
lenovo | ideapad | - | |
lenovo | tablet | - | |
lenovo | thinkcentre | - | |
lenovo | thinkpad | - | |
lenovo | thinkstation | - | |
lenovo | yoga | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:lenovo:service_bridge:*:*:*:*:*:*:*:*", "matchCriteriaId": "76A1F100-6E13-4DD3-BFA1-5907A6E3379D", "versionEndExcluding": "4.1.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:lenovo:ideacentre:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE2310B3-8DD3-427A-8A0A-B612FA3FE132", "vulnerable": false }, { "criteria": "cpe:2.3:h:lenovo:ideapad:-:*:*:*:*:*:*:*", "matchCriteriaId": "0AB1A4C4-365D-46D1-8DA8-B6C0DD349807", "vulnerable": false }, { "criteria": "cpe:2.3:h:lenovo:tablet:-:*:*:*:*:windows:*:*", "matchCriteriaId": "E9E6D176-27CB-41CA-A915-C307B1C50742", "vulnerable": false }, { "criteria": "cpe:2.3:h:lenovo:thinkcentre:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0E8DBDC-AA46-4DF0-B557-275DB8CF3CD6", "vulnerable": false }, { "criteria": "cpe:2.3:h:lenovo:thinkpad:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7BD24F8-2446-4657-A1A1-B6DDF52D2250", "vulnerable": false }, { "criteria": "cpe:2.3:h:lenovo:thinkstation:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A7A1F41-8BA5-4A8B-80DA-24A4C43FCF21", "vulnerable": false }, { "criteria": "cpe:2.3:h:lenovo:yoga:-:*:*:*:*:*:*:*", "matchCriteriaId": "84B909B1-8790-4906-AA50-1FC5FDEEE5D7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability reported in Lenovo Service Bridge before version 4.1.0.1 could allow remote code execution." }, { "lang": "es", "value": "Se informa de una vulnerabilidad en Lenovo Service Bridge en versiones anteriores a la 4.1.0.1 que podr\u00eda permitir la ejecuci\u00f3n remota de c\u00f3digo." } ], "id": "CVE-2019-6167", "lastModified": "2024-11-21T04:46:03.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "psirt@lenovo.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-06-26T14:15:10.213", "references": [ { "source": "psirt@lenovo.com", "tags": [ "Vendor Advisory" ], "url": "https://support.lenovo.com/solutions/LEN-27725" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.lenovo.com/solutions/LEN-27725" } ], "sourceIdentifier": "psirt@lenovo.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
psirt@lenovo.com | https://support.lenovo.com/solutions/LEN-27725 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.lenovo.com/solutions/LEN-27725 | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
lenovo | service_bridge | * | |
lenovo | ideacentre | - | |
lenovo | ideapad | - | |
lenovo | tablet | - | |
lenovo | thinkcentre | - | |
lenovo | thinkpad | - | |
lenovo | thinkstation | - | |
lenovo | yoga | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:lenovo:service_bridge:*:*:*:*:*:*:*:*", "matchCriteriaId": "76A1F100-6E13-4DD3-BFA1-5907A6E3379D", "versionEndExcluding": "4.1.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:lenovo:ideacentre:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE2310B3-8DD3-427A-8A0A-B612FA3FE132", "vulnerable": false }, { "criteria": "cpe:2.3:h:lenovo:ideapad:-:*:*:*:*:*:*:*", "matchCriteriaId": "0AB1A4C4-365D-46D1-8DA8-B6C0DD349807", "vulnerable": false }, { "criteria": "cpe:2.3:h:lenovo:tablet:-:*:*:*:*:windows:*:*", "matchCriteriaId": "E9E6D176-27CB-41CA-A915-C307B1C50742", "vulnerable": false }, { "criteria": "cpe:2.3:h:lenovo:thinkcentre:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0E8DBDC-AA46-4DF0-B557-275DB8CF3CD6", "vulnerable": false }, { "criteria": "cpe:2.3:h:lenovo:thinkpad:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7BD24F8-2446-4657-A1A1-B6DDF52D2250", "vulnerable": false }, { "criteria": "cpe:2.3:h:lenovo:thinkstation:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A7A1F41-8BA5-4A8B-80DA-24A4C43FCF21", "vulnerable": false }, { "criteria": "cpe:2.3:h:lenovo:yoga:-:*:*:*:*:*:*:*", "matchCriteriaId": "84B909B1-8790-4906-AA50-1FC5FDEEE5D7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability reported in Lenovo Service Bridge before version 4.1.0.1 could allow remote code execution." }, { "lang": "es", "value": "Se informa de una vulnerabilidad en Lenovo Service Bridge en versiones anteriores a la 4.1.0.1 que podr\u00eda permitir la ejecuci\u00f3n remota de c\u00f3digo." } ], "id": "CVE-2019-6168", "lastModified": "2024-11-21T04:46:04.083", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "psirt@lenovo.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-06-26T14:15:10.277", "references": [ { "source": "psirt@lenovo.com", "tags": [ "Vendor Advisory" ], "url": "https://support.lenovo.com/solutions/LEN-27725" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.lenovo.com/solutions/LEN-27725" } ], "sourceIdentifier": "psirt@lenovo.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
psirt@lenovo.com | https://support.lenovo.com/solutions/LEN-27725 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.lenovo.com/solutions/LEN-27725 | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
lenovo | service_bridge | * | |
lenovo | ideacentre | - | |
lenovo | ideapad | - | |
lenovo | tablet | - | |
lenovo | thinkcentre | - | |
lenovo | thinkpad | - | |
lenovo | thinkstation | - | |
lenovo | yoga | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:lenovo:service_bridge:*:*:*:*:*:*:*:*", "matchCriteriaId": "76A1F100-6E13-4DD3-BFA1-5907A6E3379D", "versionEndExcluding": "4.1.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:lenovo:ideacentre:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE2310B3-8DD3-427A-8A0A-B612FA3FE132", "vulnerable": false }, { "criteria": "cpe:2.3:h:lenovo:ideapad:-:*:*:*:*:*:*:*", "matchCriteriaId": "0AB1A4C4-365D-46D1-8DA8-B6C0DD349807", "vulnerable": false }, { "criteria": "cpe:2.3:h:lenovo:tablet:-:*:*:*:*:windows:*:*", "matchCriteriaId": "E9E6D176-27CB-41CA-A915-C307B1C50742", "vulnerable": false }, { "criteria": "cpe:2.3:h:lenovo:thinkcentre:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0E8DBDC-AA46-4DF0-B557-275DB8CF3CD6", "vulnerable": false }, { "criteria": "cpe:2.3:h:lenovo:thinkpad:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7BD24F8-2446-4657-A1A1-B6DDF52D2250", "vulnerable": false }, { "criteria": "cpe:2.3:h:lenovo:thinkstation:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A7A1F41-8BA5-4A8B-80DA-24A4C43FCF21", "vulnerable": false }, { "criteria": "cpe:2.3:h:lenovo:yoga:-:*:*:*:*:*:*:*", "matchCriteriaId": "84B909B1-8790-4906-AA50-1FC5FDEEE5D7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability reported in Lenovo Service Bridge before version 4.1.0.1 could allow unencrypted downloads over FTP." }, { "lang": "es", "value": "Una vulnerabilidad comunicada en Lenovo Service Bridge antes de la versi\u00f3n 4.1.0.1 podr\u00eda permitir descargas sin cifrar a trav\u00e9s de FTP." } ], "id": "CVE-2019-6169", "lastModified": "2024-11-21T04:46:04.213", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "psirt@lenovo.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-06-26T14:15:10.357", "references": [ { "source": "psirt@lenovo.com", "tags": [ "Vendor Advisory" ], "url": "https://support.lenovo.com/solutions/LEN-27725" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.lenovo.com/solutions/LEN-27725" } ], "sourceIdentifier": "psirt@lenovo.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-311" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
psirt@lenovo.com | https://support.lenovo.com/solutions/LEN-27725 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.lenovo.com/solutions/LEN-27725 | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
lenovo | service_bridge | * | |
lenovo | ideacentre | - | |
lenovo | ideapad | - | |
lenovo | tablet | - | |
lenovo | thinkcentre | - | |
lenovo | thinkpad | - | |
lenovo | thinkstation | - | |
lenovo | yoga | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:lenovo:service_bridge:*:*:*:*:*:*:*:*", "matchCriteriaId": "76A1F100-6E13-4DD3-BFA1-5907A6E3379D", "versionEndExcluding": "4.1.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:lenovo:ideacentre:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE2310B3-8DD3-427A-8A0A-B612FA3FE132", "vulnerable": false }, { "criteria": "cpe:2.3:h:lenovo:ideapad:-:*:*:*:*:*:*:*", "matchCriteriaId": "0AB1A4C4-365D-46D1-8DA8-B6C0DD349807", "vulnerable": false }, { "criteria": "cpe:2.3:h:lenovo:tablet:-:*:*:*:*:windows:*:*", "matchCriteriaId": "E9E6D176-27CB-41CA-A915-C307B1C50742", "vulnerable": false }, { "criteria": "cpe:2.3:h:lenovo:thinkcentre:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0E8DBDC-AA46-4DF0-B557-275DB8CF3CD6", "vulnerable": false }, { "criteria": "cpe:2.3:h:lenovo:thinkpad:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7BD24F8-2446-4657-A1A1-B6DDF52D2250", "vulnerable": false }, { "criteria": "cpe:2.3:h:lenovo:thinkstation:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A7A1F41-8BA5-4A8B-80DA-24A4C43FCF21", "vulnerable": false }, { "criteria": "cpe:2.3:h:lenovo:yoga:-:*:*:*:*:*:*:*", "matchCriteriaId": "84B909B1-8790-4906-AA50-1FC5FDEEE5D7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability reported in Lenovo Service Bridge before version 4.1.0.1 could allow cross-site request forgery." }, { "lang": "es", "value": "Se informa de una vulnerabilidad en Lenovo Service Bridge en versiones anteriores a la 4.1.0.1 que podr\u00eda permitir Cross-Site Request Forgery (CSRF)." } ], "id": "CVE-2019-6166", "lastModified": "2024-11-21T04:46:03.833", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.5, "source": "psirt@lenovo.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-06-26T14:15:10.153", "references": [ { "source": "psirt@lenovo.com", "tags": [ "Vendor Advisory" ], "url": "https://support.lenovo.com/solutions/LEN-27725" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.lenovo.com/solutions/LEN-27725" } ], "sourceIdentifier": "psirt@lenovo.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
var-201704-0161
Vulnerability from variot
Remote code execution in Lenovo Updates (not Lenovo System Update) allows man-in-the-middle attackers to execute arbitrary code. LenovoUpdates is a set of drivers and software updates from China
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201704-0161", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "flex", "scope": "eq", "trust": 1.8, "vendor": "lenovo", "version": "2-150" }, { "model": "flex", "scope": "eq", "trust": 1.8, "vendor": "lenovo", "version": "2-140" }, { "model": "updates", "scope": "eq", "trust": 1.6, "vendor": "lenovo", "version": null }, { "model": "z50-75", "scope": "eq", "trust": 0.9, "vendor": "lenovo", "version": "0" }, { "model": "z40-75", "scope": "eq", "trust": 0.9, "vendor": "lenovo", "version": "0" }, { "model": "yoga", "scope": "eq", "trust": 0.9, "vendor": "lenovo", "version": "2-110" }, { "model": "y70-70 touch", "scope": "eq", "trust": 0.9, "vendor": "lenovo", "version": "0" }, { "model": "y40-70", "scope": "eq", "trust": 0.9, "vendor": "lenovo", "version": "0" }, { "model": "miix", "scope": "eq", "trust": 0.9, "vendor": "lenovo", "version": "3-10300" }, { "model": "m50-70", "scope": "eq", "trust": 0.9, "vendor": "lenovo", "version": "0" }, { "model": "m30-70", "scope": "eq", "trust": 0.9, "vendor": "lenovo", "version": "0" }, { "model": "ideapad 305-15ihw", "scope": "eq", "trust": 0.9, "vendor": "lenovo", "version": "0" }, { "model": "ideapad 305-15abm", "scope": "eq", "trust": 0.9, "vendor": "lenovo", "version": "0" }, { "model": "g70-70", "scope": "eq", "trust": 0.9, "vendor": "lenovo", "version": "0" }, { "model": "g70-35", "scope": "eq", "trust": 0.9, "vendor": "lenovo", "version": "0" }, { "model": "g50-45", "scope": "eq", "trust": 0.9, "vendor": "lenovo", "version": "0" }, { "model": "g50-30", "scope": "eq", "trust": 0.9, "vendor": "lenovo", "version": "0" }, { "model": "g40-30", "scope": "eq", "trust": 0.9, "vendor": "lenovo", "version": "0" }, { "model": "flex 2-15d", "scope": "eq", "trust": 0.9, "vendor": "lenovo", "version": "0" }, { "model": "flex 2-14d", "scope": "eq", "trust": 0.9, "vendor": "lenovo", "version": "0" }, { "model": "flex pro-15", "scope": "eq", "trust": 0.9, "vendor": "lenovo", "version": "20" }, { "model": "edge", "scope": "eq", "trust": 0.9, "vendor": "lenovo", "version": "150" }, { "model": "e50-70", "scope": "eq", "trust": 0.9, "vendor": "lenovo", "version": "0" }, { "model": "e40-70", "scope": "eq", "trust": 0.9, "vendor": "lenovo", "version": "0" }, { "model": "e40-30", "scope": "eq", "trust": 0.9, "vendor": "lenovo", "version": "0" }, { "model": "e10-30", "scope": "eq", "trust": 0.9, "vendor": "lenovo", "version": "0" }, { "model": "b50-70", "scope": "eq", "trust": 0.9, "vendor": "lenovo", "version": "0" }, { "model": "b50-45", "scope": "eq", "trust": 0.9, "vendor": "lenovo", "version": "0" }, { "model": "b50-30 touch", "scope": "eq", "trust": 0.9, "vendor": "lenovo", "version": "0" }, { "model": "b50-30", "scope": "eq", "trust": 0.9, "vendor": "lenovo", "version": "0" }, { "model": "b40-70", "scope": "eq", "trust": 0.9, "vendor": "lenovo", "version": "0" }, { "model": "b40-45", "scope": "eq", "trust": 0.9, "vendor": "lenovo", "version": "0" }, { "model": "b40-30", "scope": "eq", "trust": 0.9, "vendor": "lenovo", "version": "0" }, { "model": "305-15iby", "scope": "eq", "trust": 0.9, "vendor": "lenovo", "version": "0" }, { "model": "updates", "scope": null, "trust": 0.8, "vendor": "lenovo", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-05420" }, { "db": "BID", "id": "97560" }, { "db": "JVNDB", "id": "JVNDB-2016-008351" }, { "db": "CNNVD", "id": "CNNVD-201704-471" }, { "db": "NVD", "id": "CVE-2016-8237" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:lenovo:updates", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-008351" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "97560" } ], "trust": 0.3 }, "cve": "CVE-2016-8237", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "CVE-2016-8237", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "CNVD-2017-05420", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "VHN-97057", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "id": "CVE-2016-8237", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2016-8237", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2016-8237", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2017-05420", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201704-471", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-97057", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-05420" }, { "db": "VULHUB", "id": "VHN-97057" }, { "db": "JVNDB", "id": "JVNDB-2016-008351" }, { "db": "CNNVD", "id": "CNNVD-201704-471" }, { "db": "NVD", "id": "CVE-2016-8237" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Remote code execution in Lenovo Updates (not Lenovo System Update) allows man-in-the-middle attackers to execute arbitrary code. LenovoUpdates is a set of drivers and software updates from China", "sources": [ { "db": "NVD", "id": "CVE-2016-8237" }, { "db": "JVNDB", "id": "JVNDB-2016-008351" }, { "db": "CNVD", "id": "CNVD-2017-05420" }, { "db": "BID", "id": "97560" }, { "db": "VULHUB", "id": "VHN-97057" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-8237", "trust": 3.4 }, { "db": "LENOVO", "id": "LEN-8313", "trust": 2.6 }, { "db": "BID", "id": "97560", "trust": 2.0 }, { "db": "JVNDB", "id": "JVNDB-2016-008351", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201704-471", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2017-05420", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-97057", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-05420" }, { "db": "VULHUB", "id": "VHN-97057" }, { "db": "BID", "id": "97560" }, { "db": "JVNDB", "id": "JVNDB-2016-008351" }, { "db": "CNNVD", "id": "CNNVD-201704-471" }, { "db": "NVD", "id": "CVE-2016-8237" } ] }, "id": "VAR-201704-0161", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2017-05420" }, { "db": "VULHUB", "id": "VHN-97057" } ], "trust": 1.340624998125 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-05420" } ] }, "last_update_date": "2024-11-23T22:56:14.646000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "LEN-8313", "trust": 0.8, "url": "https://support.lenovo.com/jp/ja/solutions/len-8313" }, { "title": "LenovoUpdates Remote Code Execution Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/92762" }, { "title": "Lenovo Updates Fixes for permission permissions and access control vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=69223" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-05420" }, { "db": "JVNDB", "id": "JVNDB-2016-008351" }, { "db": "CNNVD", "id": "CNNVD-201704-471" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-264", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-97057" }, { "db": "JVNDB", "id": "JVNDB-2016-008351" }, { "db": "NVD", "id": "CVE-2016-8237" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://support.lenovo.com/us/en/solutions/len-8313" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/97560" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-8237" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-8237" }, { "trust": 0.3, "url": "http://www.lenovo.com/ca/en/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-05420" }, { "db": "VULHUB", "id": "VHN-97057" }, { "db": "BID", "id": "97560" }, { "db": "JVNDB", "id": "JVNDB-2016-008351" }, { "db": "CNNVD", "id": "CNNVD-201704-471" }, { "db": "NVD", "id": "CVE-2016-8237" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2017-05420" }, { "db": "VULHUB", "id": "VHN-97057" }, { "db": "BID", "id": "97560" }, { "db": "JVNDB", "id": "JVNDB-2016-008351" }, { "db": "CNNVD", "id": "CNNVD-201704-471" }, { "db": "NVD", "id": "CVE-2016-8237" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-04-26T00:00:00", "db": "CNVD", "id": "CNVD-2017-05420" }, { "date": "2017-04-10T00:00:00", "db": "VULHUB", "id": "VHN-97057" }, { "date": "2017-04-10T00:00:00", "db": "BID", "id": "97560" }, { "date": "2017-05-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-008351" }, { "date": "2017-04-24T00:00:00", "db": "CNNVD", "id": "CNNVD-201704-471" }, { "date": "2017-04-10T19:59:00.203000", "db": "NVD", "id": "CVE-2016-8237" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-04-26T00:00:00", "db": "CNVD", "id": "CNVD-2017-05420" }, { "date": "2017-04-17T00:00:00", "db": "VULHUB", "id": "VHN-97057" }, { "date": "2017-04-18T00:03:00", "db": "BID", "id": "97560" }, { "date": "2017-05-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-008351" }, { "date": "2017-04-24T00:00:00", "db": "CNNVD", "id": "CNNVD-201704-471" }, { "date": "2024-11-21T02:59:02.597000", "db": "NVD", "id": "CVE-2016-8237" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201704-471" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Lenovo Updates Remote Code Execution Vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2017-05420" }, { "db": "JVNDB", "id": "JVNDB-2016-008351" } ], "trust": 1.4 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control", "sources": [ { "db": "CNNVD", "id": "CNNVD-201704-471" } ], "trust": 0.6 } }
var-201605-0697
Vulnerability from variot
Multiple Lenovo Products are prone to a local privilege-escalation vulnerability. A local attacker can exploit this vulnerability to run files with SYSTEM privileges.
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201605-0697", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "yoga 900-13isk", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "yoga 700-14isk", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "yoga 700-11isk", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "yoga", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "500-150" }, { "model": "yoga", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "500-140" }, { "model": "y900-17isk", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "y700-17 isk", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "y700-15 isk", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "y700-15 acz", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "y700-14 isk", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "xiaoxin", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "700-150" }, { "model": "thinkpad yoga", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "140" }, { "model": "thinkpad yoga", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "x2600" }, { "model": "thinkpad", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "x2600" }, { "model": "thinkpad yoga", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "x10" }, { "model": "thinkpad tablet", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "x10" }, { "model": "thinkpad t560", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "thinkpad t460s", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "thinkpad t460p", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "thinkpad t460", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "thinkpad p70", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "thinkpad p50", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "thinkpad l560", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "thinkpad l460", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "thinkpad e565", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "thinkpad e560", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "thinkpad e465", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "thinkpad e460", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "thinkpad 13e", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "m51-80", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "ideapad isk", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "700-170" }, { "model": "ideapad", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "700-170" }, { "model": "ideapad isk", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "700-150" }, { "model": "ideapad", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "700-150" }, { "model": "ideapad 500s-15isk", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "ideapad 500s-14isk", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "ideapad 500s-13isk", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "ideapad isk", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "500-150" }, { "model": "ideapad isk", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "500-140" }, { "model": "flex3-1580", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "flex3-1480", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "edge", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "2-15800" } ], "sources": [ { "db": "BID", "id": "92213" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported the issue.", "sources": [ { "db": "BID", "id": "92213" } ], "trust": 0.3 }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple Lenovo Products are prone to a local privilege-escalation vulnerability.\nA local attacker can exploit this vulnerability to run files with SYSTEM privileges.", "sources": [ { "db": "BID", "id": "92213" } ], "trust": 0.3 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "92213", "trust": 0.3 } ], "sources": [ { "db": "BID", "id": "92213" } ] }, "id": "VAR-201605-0697", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.311111108 }, "last_update_date": "2022-05-17T01:52:38.710000Z", "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 0.3, "url": "http://www.lenovo.com/ca/en/" }, { "trust": 0.3, "url": "https://support.lenovo.com/us/en/product_security/len_4884" } ], "sources": [ { "db": "BID", "id": "92213" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "BID", "id": "92213" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-05-02T00:00:00", "db": "BID", "id": "92213" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-05-02T00:00:00", "db": "BID", "id": "92213" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "92213" } ], "trust": 0.3 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple Lenovo Products Dolby Audio X2 Local Privilege Escalation Vulnerability", "sources": [ { "db": "BID", "id": "92213" } ], "trust": 0.3 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Design Error", "sources": [ { "db": "BID", "id": "92213" } ], "trust": 0.3 } }
var-202003-1194
Vulnerability from variot
MITRE is populating this ID because it was assigned prior to Lenovo becoming a CNA. A buffer overflow vulnerability was reported, (fixed and publicly disclosed in 2015) in the Lenovo Service Engine (LSE), affecting various versions of BIOS for Lenovo Notebooks, that could allow a remote user to execute arbitrary code on the system. Lenovo Service Engine (LSE) Exists in a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Multiple products are prone to a remote code-execution vulnerability. An attacker can exploit this issue to execute arbitrary code in the context of an affected system. Failed exploit attempts may result in a denial-of-service condition
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202003-1194", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "g40-80", "scope": "lt", "trust": 1.0, "vendor": "lenovo", "version": "b0cn75ww" }, { "model": "g50-80 touch v3000", "scope": "lt", "trust": 1.0, "vendor": "lenovo", "version": "b0cn75ww" }, { "model": "flex 2 pro-15", "scope": "lt", "trust": 1.0, "vendor": "lenovo", "version": "b9cn17ww" }, { "model": "flex 3-1120", "scope": "lt", "trust": 1.0, "vendor": "lenovo", "version": "c0cn25ww" }, { "model": "z41-70", "scope": "lt", "trust": 1.0, "vendor": "lenovo", "version": "c2cn18ww\\(v1.04\\)" }, { "model": "ideapad 100-15iby", "scope": "lt", "trust": 1.0, "vendor": "lenovo", "version": "v1.02_\\(cccn13ww\\)" }, { "model": "m40-35", "scope": "lt", "trust": 1.0, "vendor": "lenovo", "version": "bbcn15ww\\(v1.06\\)" }, { "model": "g50-80 touch", "scope": "lt", "trust": 1.0, "vendor": "lenovo", "version": "b0cn75ww" }, { "model": "flex 3-1570", "scope": "lt", "trust": 1.0, "vendor": "lenovo", "version": "bdcn30ww" }, { "model": "yoga 3 14", "scope": "lt", "trust": 1.0, "vendor": "lenovo", "version": "bacn33ww" }, { "model": "s435", "scope": "lt", "trust": 1.0, "vendor": "lenovo", "version": "bbcn15ww\\(v1.06\\)" }, { "model": "ideapad 100-14iby", "scope": "lt", "trust": 1.0, "vendor": "lenovo", "version": "v1.02_\\(cccn13ww\\)" }, { "model": "flex 2 pro-15", "scope": "lt", "trust": 1.0, "vendor": "lenovo", "version": "a9cn46ww" }, { "model": "edge 15", "scope": "lt", "trust": 1.0, "vendor": "lenovo", "version": "b9cn17ww" }, { "model": "g50-80m", "scope": "lt", "trust": 1.0, "vendor": "lenovo", "version": "cbcn75ww" }, { "model": "g40-80m", "scope": "lt", "trust": 1.0, "vendor": "lenovo", "version": "cbcn75ww" }, { "model": "flex 3-1470", "scope": "lt", "trust": 1.0, "vendor": "lenovo", "version": "bdcn30ww" }, { "model": "y40-80", "scope": "lt", "trust": 1.0, "vendor": "lenovo", "version": "b5cn36ww\\(v2.02\\)" }, { "model": "u41-70", "scope": "lt", "trust": 1.0, "vendor": "lenovo", "version": "bdcn30ww" }, { "model": "g50-80", "scope": "lt", "trust": 1.0, "vendor": "lenovo", "version": "b0cn75ww" }, { "model": "s41-70", "scope": "lt", "trust": 1.0, "vendor": "lenovo", "version": "bdcn30ww" }, { "model": "s21e", "scope": "lt", "trust": 1.0, "vendor": "lenovo", "version": "c4cn14ww\\(v1.04\\)" }, { "model": "g70-80", "scope": "lt", "trust": 1.0, "vendor": "lenovo", "version": "abcn75ww" }, { "model": "edge 15", "scope": "lt", "trust": 1.0, "vendor": "lenovo", "version": "a9cn46ww" }, { "model": "u31-70", "scope": "lt", "trust": 1.0, "vendor": "lenovo", "version": "afcn30ww\\(v2.02\\)" }, { "model": "z51-70", "scope": "lt", "trust": 1.0, "vendor": "lenovo", "version": "c2cn18ww\\(v1.04\\)" }, { "model": "z70-80", "scope": "lt", "trust": 1.0, "vendor": "lenovo", "version": "abcn75ww" }, { "model": "yoga 3 11", "scope": "lt", "trust": 1.0, "vendor": "lenovo", "version": "b8cn30ww\\(v2.08\\)" }, { "model": "b50-10", "scope": "lt", "trust": 1.0, "vendor": "lenovo", "version": "cccn13ww\\(v1.02\\)" }, { "model": "b50-10", "scope": null, "trust": 0.8, "vendor": "lenovo", "version": null }, { "model": "edge 15", "scope": null, "trust": 0.8, "vendor": "lenovo", "version": null }, { "model": "flex 2 pro-15", "scope": null, "trust": 0.8, "vendor": "lenovo", "version": null }, { "model": "flex 3-1120", "scope": null, "trust": 0.8, "vendor": "lenovo", "version": null }, { "model": "flex 3-1470", "scope": null, "trust": 0.8, "vendor": "lenovo", "version": null }, { "model": "flex 3-1570", "scope": null, "trust": 0.8, "vendor": "lenovo", "version": null }, { "model": "g40-80", "scope": null, "trust": 0.8, "vendor": "lenovo", "version": null }, { "model": "g50-80 touch v3000", "scope": null, "trust": 0.8, "vendor": "lenovo", "version": null }, { "model": "g50-80 touch", "scope": null, "trust": 0.8, "vendor": "lenovo", "version": null }, { "model": "g50-80", "scope": null, "trust": 0.8, "vendor": "lenovo", "version": null }, { "model": "flex pro-15", "scope": "eq", "trust": 0.6, "vendor": "lenovo", "version": "20" }, { "model": "edge", "scope": "eq", "trust": 0.6, "vendor": "lenovo", "version": "150" }, { "model": "z70-80", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "z51-70", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "z50-75", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "z50-70", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "z41-70", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "z40-75", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "z40-70", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "yt s4040", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "yt s4030", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "yt s4005", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "yt s2000", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "yt m2620n", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "yt a7700k", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "yoga3", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "140" }, { "model": "yoga2pro-13", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "yoga", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "3110" }, { "model": "y50-70", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "y430p", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "y40-80", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "y40-70", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "x315", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "x310", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": null, "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "v30000" }, { "model": "u430touch", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "u430p", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "u41-70", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "u330touch", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "u330p", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "service engine", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "s435", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "s415", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "s410", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "s41-70", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "s40-70", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "s310", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "s21e", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "s20-30 touch", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "s20-30", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "m7100n", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "m5790n", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "m5310n", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "m40-35", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "horizon2", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "270" }, { "model": "horizon 2s", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "h5055", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "h5050", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "h5000", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "h3050", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "h3000", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "g70-80", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "g510", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "g5055", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "g5050", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "g5000", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "g50-80", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "g50-70", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "g50-45", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "g50-30", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "g410", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "g40-80", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "g40-70", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "g40-45", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "g40-30", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "flex2", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "150" }, { "model": "flex2", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "140" }, { "model": "flex", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "3-15700" }, { "model": "flex", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "3-14700" }, { "model": "flex", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "3-11200" }, { "model": "flex", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "100" }, { "model": "f5055", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "f5050", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "f5000", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "edge", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "71" }, { "model": "e10-30", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "d5055", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "d5050", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "d3000", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "c5030", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "c4030", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "c4005", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "c260", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "c2030", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "c2005", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "b750", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "b5035", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "b5030", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "b4030", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "a740", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "a5700k", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "a540", "scope": "eq", "trust": 0.3, "vendor": "lenovo", "version": "0" }, { "model": "workstations z82", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "workstations z620", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "workstations z420", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "workstations z220", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "workstations z1", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "probook s", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "probook m", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "probook b", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "elitebook p series", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "elitebook 8770w", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "elitebook 8570w", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "compaq elite series", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "83000" }, { "model": "compaq pro series", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "63050" }, { "model": "compaq", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "63000" } ], "sources": [ { "db": "BID", "id": "76416" }, { "db": "JVNDB", "id": "JVNDB-2015-008633" }, { "db": "NVD", "id": "CVE-2015-5684" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:lenovo:b50-10_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:lenovo:edge_15_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:lenovo:flex_2_pro-15_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:lenovo:flex_3-1120_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:lenovo:flex_3-1470_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:lenovo:flex_3-1570_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:lenovo:g40-80_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:lenovo:g50-80_touch_v3000_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:lenovo:g50-80_touch_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:lenovo:g50-80_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-008633" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Roel Schouwenberg and Microsoft", "sources": [ { "db": "BID", "id": "76416" }, { "db": "CNNVD", "id": "CNNVD-201512-682" } ], "trust": 0.9 }, "cve": "CVE-2015-5684", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2015-5684", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.1, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "JVNDB-2015-008633", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2015-5684", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2015-008633", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2015-5684", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "JVNDB-2015-008633", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-201512-682", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULMON", "id": "CVE-2015-5684", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2015-5684" }, { "db": "JVNDB", "id": "JVNDB-2015-008633" }, { "db": "CNNVD", "id": "CNNVD-201512-682" }, { "db": "NVD", "id": "CVE-2015-5684" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "MITRE is populating this ID because it was assigned prior to Lenovo becoming a CNA. A buffer overflow vulnerability was reported, (fixed and publicly disclosed in 2015) in the Lenovo Service Engine (LSE), affecting various versions of BIOS for Lenovo Notebooks, that could allow a remote user to execute arbitrary code on the system. Lenovo Service Engine (LSE) Exists in a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Multiple products are prone to a remote code-execution vulnerability. \nAn attacker can exploit this issue to execute arbitrary code in the context of an affected system. Failed exploit attempts may result in a denial-of-service condition", "sources": [ { "db": "NVD", "id": "CVE-2015-5684" }, { "db": "JVNDB", "id": "JVNDB-2015-008633" }, { "db": "BID", "id": "76416" }, { "db": "VULMON", "id": "CVE-2015-5684" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-5684", "trust": 2.8 }, { "db": "JVNDB", "id": "JVNDB-2015-008633", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201512-682", "trust": 0.6 }, { "db": "BID", "id": "76416", "trust": 0.4 }, { "db": "VULMON", "id": "CVE-2015-5684", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2015-5684" }, { "db": "BID", "id": "76416" }, { "db": "JVNDB", "id": "JVNDB-2015-008633" }, { "db": "CNNVD", "id": "CNNVD-201512-682" }, { "db": "NVD", "id": "CVE-2015-5684" } ] }, "id": "VAR-202003-1194", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.4444444366666666 }, "last_update_date": "2024-11-23T22:21:14.882000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "LEN-2015-020", "trust": 0.8, "url": "https://support.lenovo.com/us/en/product_security/lse_bios_notebook" }, { "title": "Lenovo Service Engine Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=113086" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-008633" }, { "db": "CNNVD", "id": "CNNVD-201512-682" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-120", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-008633" }, { "db": "NVD", "id": "CVE-2015-5684" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://support.lenovo.com/us/en/product_security/lse_bios_notebook" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-5684" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-5684" }, { "trust": 0.3, "url": "http://seclists.org/bugtraq/2015/aug/44" }, { "trust": 0.3, "url": "https://support.lenovo.com/us/en/product_security/lse_bios_desktop" }, { "trust": 0.3, "url": "http://h10032.www1.hp.com/ctg/manual/c03857419.pdf" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/120.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.securityfocus.com/bid/76416" } ], "sources": [ { "db": "VULMON", "id": "CVE-2015-5684" }, { "db": "BID", "id": "76416" }, { "db": "JVNDB", "id": "JVNDB-2015-008633" }, { "db": "CNNVD", "id": "CNNVD-201512-682" }, { "db": "NVD", "id": "CVE-2015-5684" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2015-5684" }, { "db": "BID", "id": "76416" }, { "db": "JVNDB", "id": "JVNDB-2015-008633" }, { "db": "CNNVD", "id": "CNNVD-201512-682" }, { "db": "NVD", "id": "CVE-2015-5684" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-03-27T00:00:00", "db": "VULMON", "id": "CVE-2015-5684" }, { "date": "2015-07-31T00:00:00", "db": "BID", "id": "76416" }, { "date": "2020-04-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-008633" }, { "date": "2015-07-31T00:00:00", "db": "CNNVD", "id": "CNNVD-201512-682" }, { "date": "2020-03-27T15:15:11.507000", "db": "NVD", "id": "CVE-2015-5684" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-04-01T00:00:00", "db": "VULMON", "id": "CVE-2015-5684" }, { "date": "2015-07-31T00:00:00", "db": "BID", "id": "76416" }, { "date": "2020-04-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-008633" }, { "date": "2020-04-03T00:00:00", "db": "CNNVD", "id": "CNNVD-201512-682" }, { "date": "2024-11-21T02:33:37.920000", "db": "NVD", "id": "CVE-2015-5684" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201512-682" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Lenovo Service Engine Classic buffer overflow vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-008633" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201512-682" } ], "trust": 0.6 } }