Friday, April 19, 2024

Lenovo Laptop Flaws Let Attackers Gain Admin Privileges

Privilege elevation bugs have been detected recently by the security analysts at NCC Group in the ImControllerService service of Lenovo laptops including the top models like ThinkPad and Yoga. 

This privilege elevation flaws with admin privileges allow the threat actors to execute arbitrary commands. 

The ImControllerService component of all Lenovo System Interface Foundation versions below 1.1.20.3 are vulnerable to this privilege elevation flaw.

Flaws Detected

The flaws that are affecting the Lenovo laptops are tracked as:-

  • CVE-2021-3922: A race condition vulnerability was reported in IMController, a software component of Lenovo System Interface Foundation, that could allow a local attacker to connect and interact with the IMController child process’ named pipe.
  • CVE-2021-3969: A Time of Check Time of Use (TOCTOU) vulnerability was reported in IMController, a software component of Lenovo System Interface Foundation, that could allow a local attacker to elevate privileges.

On October 29, 2021, these findings were reported by NCC Group to Lenovo, in response, on November 17, 2021, Lenovo released the security updates, and on December 14, 2021, they published the pertinent advisory.

In Lenovo laptops to communicate with universal apps like Lenovo Companion, Lenovo Settings, and Lenovo ID the System Interface Foundation Service helps the laptops to do so.

This service is one of the essential services offered by Lenovo that comes preinstalled by default on all the Lenovo laptop models. So, if this service gets disabled then the default applications of Lenovo will not work adequately.

Vulnerable System Component

The ImController requires to convey all the files and to install them from the Lenovo servers, it also conducts the child processes, and completes system configuration and maintenance tasks as per the requirement.

The SYSTEM privileges are the rights that are mostly desired by the users. It is present in the windows, and it generally enables the users to carry out all types of commands on their systems.

Once the user gets full control over the SYSTEM privileges, they can completely control the system and that’s why they can also perform the commands that are present in the system device.

Mitigation

To mitigate this flaw the users must have to update their software to the latest version, those who have Lenovo laptops or desktops, and are having the ImController version 1.1.20.2 or older version.   

Here to do so you have to follow a few simple steps, that we have mentioned below, and by doing so will eventually help the users to identify that what version they are running on:-

  • At first, open the File Explorer and go to the C:\Windows\Lenovo\ImController\PluginHost\.
  • Noe right-clicks on Lenovo.Modern.ImController.PluginHost.exe and select Properties.
  • Next tap on the Details tab.
  • Now the users can read the File version.

Officially removing the “ImController component,” or the “Lenovo System Interface Foundation” is not recommended since removing these components will make your Lenovo laptop or system behave abnormal.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Website

Latest articles

Akira Ransomware Attacks Over 250 Organizations and Collects $42 Million

The Akira ransomware variant has severely impacted more than 250 organizations worldwide, amassing...

Alert! Windows LPE Zero-day Exploit Advertised on Hacker Forums

A new zero-day Local Privilege Escalation (LPE) exploit has been put up for sale...

Palo Alto ZeroDay Exploited in The Wild Following PoC Release

Palo Alto Networks has disclosed a critical vulnerability within its PAN-OS operating system, identified...

FIN7 Hackers Attacking IT Employees Of Automotive Industry

IT employees in the automotive industry are often targeted by hackers because they have...

Russian APT44 – The Most Notorious Cyber Sabotage Group Globally

As Russia's invasion of Ukraine enters its third year, the formidable Sandworm (aka FROZENBARENTS,...

SoumniBot Exploiting Android Manifest Flaws to Evade Detection

A new banker, SoumniBot, has recently been identified. It targets Korean users and is...

LeSlipFrancais Data Breach: Customers’ Personal Information Exposed

LeSlipFrancais, the renowned French underwear brand, has confirmed a data breach impacting its customer...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

WAAP/WAF ROI Analysis

Mastering WAAP/WAF ROI Analysis

As the importance of compliance and safeguarding critical websites and APIs grows, Web Application and API Protection (WAAP) solutions play an integral role.
Key takeaways include:

  • Pricing models
  • Cost Estimation
  • ROI Calculation

Related Articles