Wednesday, April 17, 2024

Lenovo Laptop Flaws Let Attackers Gain Admin Privileges

Privilege elevation bugs have been detected recently by the security analysts at NCC Group in the ImControllerService service of Lenovo laptops including the top models like ThinkPad and Yoga. 

This privilege elevation flaws with admin privileges allow the threat actors to execute arbitrary commands. 

The ImControllerService component of all Lenovo System Interface Foundation versions below 1.1.20.3 are vulnerable to this privilege elevation flaw.

Flaws Detected

The flaws that are affecting the Lenovo laptops are tracked as:-

  • CVE-2021-3922: A race condition vulnerability was reported in IMController, a software component of Lenovo System Interface Foundation, that could allow a local attacker to connect and interact with the IMController child process’ named pipe.
  • CVE-2021-3969: A Time of Check Time of Use (TOCTOU) vulnerability was reported in IMController, a software component of Lenovo System Interface Foundation, that could allow a local attacker to elevate privileges.

On October 29, 2021, these findings were reported by NCC Group to Lenovo, in response, on November 17, 2021, Lenovo released the security updates, and on December 14, 2021, they published the pertinent advisory.

In Lenovo laptops to communicate with universal apps like Lenovo Companion, Lenovo Settings, and Lenovo ID the System Interface Foundation Service helps the laptops to do so.

This service is one of the essential services offered by Lenovo that comes preinstalled by default on all the Lenovo laptop models. So, if this service gets disabled then the default applications of Lenovo will not work adequately.

Vulnerable System Component

The ImController requires to convey all the files and to install them from the Lenovo servers, it also conducts the child processes, and completes system configuration and maintenance tasks as per the requirement.

The SYSTEM privileges are the rights that are mostly desired by the users. It is present in the windows, and it generally enables the users to carry out all types of commands on their systems.

Once the user gets full control over the SYSTEM privileges, they can completely control the system and that’s why they can also perform the commands that are present in the system device.

Mitigation

To mitigate this flaw the users must have to update their software to the latest version, those who have Lenovo laptops or desktops, and are having the ImController version 1.1.20.2 or older version.   

Here to do so you have to follow a few simple steps, that we have mentioned below, and by doing so will eventually help the users to identify that what version they are running on:-

  • At first, open the File Explorer and go to the C:\Windows\Lenovo\ImController\PluginHost\.
  • Noe right-clicks on Lenovo.Modern.ImController.PluginHost.exe and select Properties.
  • Next tap on the Details tab.
  • Now the users can read the File version.

Officially removing the “ImController component,” or the “Lenovo System Interface Foundation” is not recommended since removing these components will make your Lenovo laptop or system behave abnormal.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Website

Latest articles

LightSpy Hackers Target Indian Apple Device Users To Steal Sensitive Data

Hackers target Apple device users because they are perceived to be of higher social...

Trustifi’s Email Security Awareness Training – Empowering MSPs to Train & Protect Clients

In today's digital landscape, email security has become a critical concern for businesses of...

Personal Data Exposed in Massive Global Hack: Understanding the Implications & Guarding Privacy- Axios Security Group

In a digital age where information is the new currency, the recent global hack...

Ex-Security Engineer Jailed For Hacking Decentralized Cryptocurrency Exchanges

Ahmed exploited a vulnerability in a decentralized cryptocurrency exchange's smart contract by injecting fabricated...

Omni Hotels & Resorts Hack: Attackers have Stolen Customer Information

Omni Hotels & Resorts has revealed that it was the target of a recent...

Connect:fun Attacking Organizations Running Fortinet’s FortiClient EMS

A new exploit campaign has emerged, targeting organizations that utilize Fortinet’s FortiClient EMS.Dubbed...

TA558 Hackers Compromised 320+ Organizations’ FTP & SMTP Servers

TA558, a financially motivated threat actor identified in 2018, is targeting several countries but...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Top 3 SME Attack Vectors

Securing the Top 3 SME Attack Vectors

Cybercriminals are laying siege to small-to-medium enterprises (SMEs) across sectors. 73% of SMEs know they were breached in 2023. The real rate could be closer to 100%.

  • Stolen credentials
  • Phishing
  • Exploitation of vulnerabilities

Related Articles