6.8
CVE-2021-3614
- EPSS 0.05%
- Veröffentlicht 16.07.2021 21:15:10
- Zuletzt bearbeitet 21.11.2024 06:21:59
- Quelle psirt@lenovo.com
- Teams Watchlist Login
- Unerledigt Login
A vulnerability was reported on some Lenovo Notebook systems that could allow an attacker with physical access to elevate privileges under certain conditions during a BIOS update performed by Lenovo Vantage.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Lenovo ≫ Ideapad 1-11ada05 Firmware Versionfqcn19ww
Lenovo ≫ Ideapad 1-14ada05 Firmware Versionfqcn19ww
Lenovo ≫ V130-15ikb Firmware Version-
Lenovo ≫ 100e 2nd Gen Firmware Version-
Lenovo ≫ 300e 2nd Gen Firmware Version-
Lenovo ≫ Ideapad 730-13iml Firmware Version-
Lenovo ≫ Ideapad Flex 5-14alc05 Firmware Version-
Lenovo ≫ Ideapad Flex 5-15alc05 Firmware Version-
Lenovo ≫ Ideapad 1-11igl05 Firmware Version-
Lenovo ≫ Ideapad 1-14igl05 Firmware Version-
Lenovo ≫ Ideapad S940-14iil Firmware Version-
Lenovo ≫ Ideapad S940-14iwl Firmware Version-
Lenovo ≫ Ideapad Slim 1-11ast-05 Firmware Version-
Lenovo ≫ Ideapad Slim 1-14ast-05 Firmware Version-
Lenovo ≫ V130-15igm Firmware Version-
Lenovo ≫ V130-15ikb Firmware Version-
Lenovo ≫ V330-15ikb Firmware Version-
Lenovo ≫ V330-15isk Firmware Version-
Lenovo ≫ Ideapad Yoga C940-15irh Firmware Version-
Lenovo ≫ Ideapad Yoga S730-13iml Firmware Version-
Lenovo ≫ Ideapad Yoga S940-14iil Firmware Version-
Lenovo ≫ Ideapad Yoga S940-14iwl Firmware Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.05% | 0.113 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 6.8 | 0.9 | 5.9 |
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 4.4 | 3.4 | 6.4 |
AV:L/AC:M/Au:N/C:P/I:P/A:P
|
psirt@lenovo.com | 6.4 | 0.5 | 5.9 |
CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
|
CWE-636 Not Failing Securely ('Failing Open')
When the product encounters an error condition or failure, its design requires it to fall back to a state that is less secure than other options that are available, such as selecting the weakest encryption algorithm or using the most permissive access control restrictions.