cve-2021-3452
Vulnerability from cvelistv5
Published
2021-07-16 20:30
Modified
2024-08-03 16:53
Severity ?
EPSS score ?
Summary
A potential vulnerability in the system shutdown SMI callback function in some ThinkPad models may allow an attacker with local access and elevated privileges to execute arbitrary code.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Lenovo | ThinkPad BIOS |
Version: various |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T16:53:17.620Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-65529" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ThinkPad BIOS", "vendor": "Lenovo", "versions": [ { "status": "affected", "version": "various" } ] } ], "credits": [ { "lang": "en", "value": "Lenovo thanks Binarly efiXplorer team for reporting these issues." } ], "descriptions": [ { "lang": "en", "value": "A potential vulnerability in the system shutdown SMI callback function in some ThinkPad models may allow an attacker with local access and elevated privileges to execute arbitrary code." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-16T20:30:15", "orgId": "da227ddf-6e25-4b41-b023-0f976dcaca4b", "shortName": "lenovo" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.lenovo.com/us/en/product_security/LEN-65529" } ], "solutions": [ { "lang": "en", "value": "Update system firmware to the version (or newer) indicated for your model in the Product Impact section of LEN-65529." } ], "source": { "advisory": "LEN-65529", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@lenovo.com", "ID": "CVE-2021-3452", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ThinkPad BIOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } } ] }, "vendor_name": "Lenovo" } ] } }, "credit": [ { "lang": "eng", "value": "Lenovo thanks Binarly efiXplorer team for reporting these issues." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A potential vulnerability in the system shutdown SMI callback function in some ThinkPad models may allow an attacker with local access and elevated privileges to execute arbitrary code." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20 Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.lenovo.com/us/en/product_security/LEN-65529", "refsource": "MISC", "url": "https://support.lenovo.com/us/en/product_security/LEN-65529" } ] }, "solution": [ { "lang": "en", "value": "Update system firmware to the version (or newer) indicated for your model in the Product Impact section of LEN-65529." } ], "source": { "advisory": "LEN-65529", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "da227ddf-6e25-4b41-b023-0f976dcaca4b", "assignerShortName": "lenovo", "cveId": "CVE-2021-3452", "datePublished": "2021-07-16T20:30:16", "dateReserved": "2021-03-19T00:00:00", "dateUpdated": "2024-08-03T16:53:17.620Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-3452\",\"sourceIdentifier\":\"psirt@lenovo.com\",\"published\":\"2021-07-16T21:15:10.607\",\"lastModified\":\"2024-11-21T06:21:34.210\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A potential vulnerability in the system shutdown SMI callback function in some ThinkPad models may allow an attacker with local access and elevated privileges to execute arbitrary code.\"},{\"lang\":\"es\",\"value\":\"Una potencial vulnerabilidad en la funci\u00f3n shutdown SMI callback del sistema en algunos modelos ThinkPad, puede permitir a un atacante con acceso local y privilegios elevados ejecutar c\u00f3digo arbitrario\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@lenovo.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":4.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"psirt@lenovo.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:lenovo:bios:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61D66F0D-6C60-4CF6-A509-C6FAC2E22F95\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lenovo:thinkpad_11e_3rd_gen:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6C40A89-6683-4146-A5C2-46E253E33664\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lenovo:thinkpad_11e_4th_gen:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3364758F-CBFC-47DD-98E2-12770869EE0D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lenovo:thinkpad_11e_5th_gen:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D46E4CE-05BB-498B-98C1-C641430AE0FB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lenovo:thinkpad_11e_yoga_gen_6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AA392C0-4D5A-4440-8910-C248F17077CC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lenovo:thinkpad_13_gen_2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59C2F35D-79A1-4671-BA7E-4AAF2BA13744\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lenovo:thinkpad_e14_gen_2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC416997-C5A5-4AAA-B998-7F27B2AB2D0C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lenovo:thinkpad_e15_gen_2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94DAF479-1162-440D-95DC-A4F94C143EB1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lenovo:thinkpad_l13:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99429424-2602-458B-BB57-C2E161005587\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lenovo:thinkpad_l13_gen_2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E560943-6A00-4423-91F3-FBBBBB978F6B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lenovo:thinkpad_l13_yoga:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1295E4F8-431A-43ED-8104-DBBD0CDB1978\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lenovo:thinkpad_l13_yogo_gen_2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14789824-42A5-4944-B2BE-663456450249\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lenovo:thinkpad_l14:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"724B10DF-7AA6-4541-A1F4-388E7BEB2319\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lenovo:thinkpad_l14_gen_2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CE86BB2-232D-4DD9-9630-EA6517C64EB1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lenovo:thinkpad_l15:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65290880-A7DF-4350-8BBB-8175811EC15E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lenovo:thinkpad_l15_gen_2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77DDB8D3-F2BD-42AB-B927-D38FB54EE902\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lenovo:thinkpad_l380:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0FFC7C4-2CAF-440A-8ED8-F25EA19F86C1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lenovo:thinkpad_l380_yoga:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2187E37E-E3D6-467A-934C-D5613FBF8641\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lenovo:thinkpad_l390:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"072FAC2E-2349-465C-96C0-C24E3891A7B3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lenovo:thinkpad_l390_yoga:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17DD928B-F0BF-44F1-9EA4-DC82233A2E69\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lenovo:thinkpad_t460:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D86FD3AD-D731-4C30-8A72-EC1A45B203F0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lenovo:thinkpad_x12_detachable_gen_1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2439F63-731F-47A4-B625-B3520ECDA0B1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lenovo:thinkpad_x260:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08393A13-D68E-4042-B223-EF80E581EEBC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lenovo:thinkpad_x380_yoga:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5E1704F-6BB6-4B7C-ADE6-720533FB46E4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lenovo:thinkpad_yoga_11e_3rd_gen:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA8D4BE6-6E87-4892-9E16-2799D0E0CA21\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lenovo:thinkpad_yoga_11e_4th_gen:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24977327-E104-4F51-8CF1-6EF1FEAED9F8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lenovo:thinkpad_yoga_370:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30B0E5C1-5A7B-4310-A4D3-A12E1F059568\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:lenovo:bios:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61D66F0D-6C60-4CF6-A509-C6FAC2E22F95\"}]}]}],\"references\":[{\"url\":\"https://support.lenovo.com/us/en/product_security/LEN-65529\",\"source\":\"psirt@lenovo.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.lenovo.com/us/en/product_security/LEN-65529\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.