Researchers Find UEFI Vulnerability in Three Lenovo Computers Affecting Millions
2 min readResearchers Find UEFI Vulnerability in Three Lenovo Computers Affecting Millions
Researchers Find UEFI Vulnerability in Three Lenovo Computers Affecting Millions.
According to some News, there are three high-impact Unified Extensible Firmware Interface (UEFI) security vulnerabilities announced, namely CVE-2021-3970, CVE-2021-3971 and CVE-2021-3972, which have been found to affect Various Lenovo devices such as Lenovo Flex, IdeaPads, and Yoga laptops.
Originally, CVE-2021-3971 and CVE-2021-3972 were intended for use in the manufacturing process of Lenovo’s consumer notebooks.
However, when making the BIOS image, they were left in by mistake without deactivating first.
Attackers could gain access to these devices, and they would be able to disable SPI flash protection or UEFI Secure Boot from a privileged user-mode process while the operating system is running.
Lenovo released security patches for these vulnerabilities yesterday, as follows:
CVE-2021-3970 – Due to imperfect validation work on some Lenovo notebook models, a potential vulnerability exists in the LenovoVariable SMI Handler that could allow an attacker with local access and high privileges to execute arbitrary code.
CVE-2021-3971 – A potential vulnerability exists in a driver used in an old manufacturing process on some consumer Lenovo laptop devices that was incorrectly included in the BIOS image, potentially allowing an attacker with high privileges to modify the NVRAM by modifying the The variable modifies the firmware protected area.
CVE-2021-3972 – A potential vulnerability in a driver used in the manufacturing process of some consumer Lenovo laptop devices that was mistaken for not being disabled could allow an attacker with high privileges to modify NVRAM variables to Modify Secure Boot settings.
It is important to take advantage of these security patches to avoid future compromises.
These threats are launched early in the PC boot process, before the operating system gains control.
Therefore, an attacker will be able to counteract any security measures based on the operating system.
Reference:
https://support.lenovo.com/us/en/product_security/LEN-73440