Saturday, December 14, 2024
HomeCVE/vulnerabilityLenovo Laptop Flaws Let Attackers Gain Admin Privileges

Lenovo Laptop Flaws Let Attackers Gain Admin Privileges

Published on

SIEM as a Service

Privilege elevation bugs have been detected recently by the security analysts at NCC Group in the ImControllerService service of Lenovo laptops including the top models like ThinkPad and Yoga. 

This privilege elevation flaws with admin privileges allow the threat actors to execute arbitrary commands. 

The ImControllerService component of all Lenovo System Interface Foundation versions below 1.1.20.3 are vulnerable to this privilege elevation flaw.

- Advertisement - SIEM as a Service

Flaws Detected

The flaws that are affecting the Lenovo laptops are tracked as:-

  • CVE-2021-3922: A race condition vulnerability was reported in IMController, a software component of Lenovo System Interface Foundation, that could allow a local attacker to connect and interact with the IMController child process’ named pipe.
  • CVE-2021-3969: A Time of Check Time of Use (TOCTOU) vulnerability was reported in IMController, a software component of Lenovo System Interface Foundation, that could allow a local attacker to elevate privileges.

On October 29, 2021, these findings were reported by NCC Group to Lenovo, in response, on November 17, 2021, Lenovo released the security updates, and on December 14, 2021, they published the pertinent advisory.

In Lenovo laptops to communicate with universal apps like Lenovo Companion, Lenovo Settings, and Lenovo ID the System Interface Foundation Service helps the laptops to do so.

This service is one of the essential services offered by Lenovo that comes preinstalled by default on all the Lenovo laptop models. So, if this service gets disabled then the default applications of Lenovo will not work adequately.

Vulnerable System Component

The ImController requires to convey all the files and to install them from the Lenovo servers, it also conducts the child processes, and completes system configuration and maintenance tasks as per the requirement.

The SYSTEM privileges are the rights that are mostly desired by the users. It is present in the windows, and it generally enables the users to carry out all types of commands on their systems.

Once the user gets full control over the SYSTEM privileges, they can completely control the system and that’s why they can also perform the commands that are present in the system device.

Mitigation

To mitigate this flaw the users must have to update their software to the latest version, those who have Lenovo laptops or desktops, and are having the ImController version 1.1.20.2 or older version.   

Here to do so you have to follow a few simple steps, that we have mentioned below, and by doing so will eventually help the users to identify that what version they are running on:-

  • At first, open the File Explorer and go to the C:\Windows\Lenovo\ImController\PluginHost\.
  • Noe right-clicks on Lenovo.Modern.ImController.PluginHost.exe and select Properties.
  • Next tap on the Details tab.
  • Now the users can read the File version.

Officially removing the “ImController component,” or the “Lenovo System Interface Foundation” is not recommended since removing these components will make your Lenovo laptop or system behave abnormal.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

“Password Era is Ending,” Microsoft to Delete 1 Billion Passwords

Microsoft has announced that it is currently blocking an astounding 7,000 password attacks every...

Over 300,000 Prometheus Servers Vulnerable to DoS Attacks Due to RepoJacking Exploit

The research identified vulnerabilities in Prometheus, including information disclosure from exposed servers, DoS risks...

Reyee OS IoT Devices Compromised: Over-The-Air Attack Bypasses Wi-Fi Logins

Researchers discovered multiple vulnerabilities in Ruijie Networks' cloud-connected devices. By exploiting these vulnerabilities, attackers...

New Android Banking Malware Attacking Indian Banks To Steal Login Credentials

Researchers have discovered a new Android banking trojan targeting Indian users, and this malware...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Over 300,000 Prometheus Servers Vulnerable to DoS Attacks Due to RepoJacking Exploit

The research identified vulnerabilities in Prometheus, including information disclosure from exposed servers, DoS risks...

Reyee OS IoT Devices Compromised: Over-The-Air Attack Bypasses Wi-Fi Logins

Researchers discovered multiple vulnerabilities in Ruijie Networks' cloud-connected devices. By exploiting these vulnerabilities, attackers...

New Android Banking Malware Attacking Indian Banks To Steal Login Credentials

Researchers have discovered a new Android banking trojan targeting Indian users, and this malware...