Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7jpm-3pp4-32q5

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 4.4

Описание

A vulnerability has been identified in a signed kernel driver for the BIOS of some ThinkPad systems that can allow an attacker with Windows administrator-level privileges to call System Management Mode (SMM) services. This could lead to a denial of service attack or allow certain BIOS variables or settings to be altered (such as boot sequence). The setting or changing of BIOS passwords is not affected by this vulnerability.

A vulnerability has been identified in a signed kernel driver for the BIOS of some ThinkPad systems that can allow an attacker with Windows administrator-level privileges to call System Management Mode (SMM) services. This could lead to a denial of service attack or allow certain BIOS variables or settings to be altered (such as boot sequence). The setting or changing of BIOS passwords is not affected by this vulnerability.

EPSS

Процентиль: 11%
0.00037
Низкий

4.4 Medium

CVSS3

Дефекты

CWE-284

Связанные уязвимости

CVSS3: 4.4
nvd
около 9 лет назад

A vulnerability has been identified in a signed kernel driver for the BIOS of some ThinkPad systems that can allow an attacker with Windows administrator-level privileges to call System Management Mode (SMM) services. This could lead to a denial of service attack or allow certain BIOS variables or settings to be altered (such as boot sequence). The setting or changing of BIOS passwords is not affected by this vulnerability.

EPSS

Процентиль: 11%
0.00037
Низкий

4.4 Medium

CVSS3

Дефекты

CWE-284