Lenovo

Lenovo has fixed two high-severity vulnerabilities impacting various ThinkBook, IdeaPad, and Yoga laptop models that could allow an attacker to deactivate UEFI Secure Boot.

UEFI Secure Boot is a verification system that ensures no malicious code can be loaded and executed during the computer boot process.

The consequences of running unsigned, malicious code before OS boot are significant, as threat actors can bypass all security protections to plant malware that persists between OS reinstallations.

The problem arises from Lenovo mistakenly including an early development driver that could change secure boot settings from the OS in the final production versions.

This means the vulnerabilities are not caused by a bug in the code but rather a practical error of including the incorrect driver on production devices.

The presence of these drivers in multiple Lenovo products was discovered by ESET researchers, who reported it to the computer vendor.

ESET-tweet

"The affected drivers were meant to be used only during the manufacturing process but were mistakenly included in the production," explains the Twitter thread by ESET.

ESET says that the vulnerabilities can be exploited simply by creating special NVRAM variables and shared a link to a Twitter thread by Nikolaj Schlej that explains why UEFI firmware developers should not use NVRAM as trusted storage.

The two flaws fixed by Lenovo via BIOS fix the following vulnerabilities:

  • CVE-2022-3430: Vulnerability in the WMI Setup driver on some consumer Lenovo Notebook devices may allow an attacker with elevated privileges to modify Secure Boot setting by modifying an NVRAM variable.
  • CVE-2022-3431: Vulnerability in a driver used during manufacturing process on some consumer Lenovo Notebook devices that was mistakenly not deactivated may allow an attacker with elevated privileges to modify Secure Boot setting by modifying an NVRAM variable.

There's also a third flaw of similar nature, tracked as CVE-2022-3432, impacting only Ideapad Y700-14ISK. Lenovo will not address this vulnerability as the affected product has reached its end of life (EOL).

Owners of supported Lenovo computers can check the model list on the vendor's security bulletin to determine if either flaw impacts them.

The firmware versions that fix the vulnerabilities are mentioned under the CVE IDs, so make sure to upgrade to that version or later.

For official Lenovo software, check out this online support portal or run the update tool pre-installed on your computer.

Related Articles:

CISA warns of hackers exploiting Chrome, EoL D-Link bugs

PoC exploit released for RCE zero-day in D-Link EXO AX4800 routers

Microsoft May 2024 Patch Tuesday fixes 3 zero-days, 61 flaws

Windows 10 KB5037768 update released with new features and 20 fixes

Google Chrome emergency update fixes 6th zero-day exploited in 2024