Tuesday, April 16, 2024

Multiple Vulnerabilities Affected Lenovo’s Server Infrastructure that allows Hackers to Execute Malicious Code

Researchers discovered several vulnerabilities that affected Lenovo servers/application infrastructure that could have exploited the systems integrity, availability, and confidentiality.

Lenovo Group, one of the multinational technology company, sells personal computers, tablets, smartphones, workstations, servers, electronic storage devices.

Totally nine vulnerabilities were identified, in which, two vulnerabilities are categorized under High severity, and seven vulnerabilities are fixed under medium severity.

According to Swascan, In line with the spirit and objectives of Swascan, this press release is not intended to discuss or dissect the identified vulnerabilities. The purpose of this article, however, is to shift the focus on the importance of real collaboration between vendors and CyberSecurity companies.

Some of the Resolved  Vulnerabilities That Affected Lenovo Server Infrastructure

CWE – 78

This vulnerability allows attackers to execute the malicious command directly on the operating system. It exploits the Lenovo applications which don’t have direct access for attackers and also attacker-controlled commands may run with special system privileges.

CWE – 119:

A high severity vulnerability that resides in the memory buffer let attackers perform read or write operations to be performed on memory locations that may be associated with other variables, data structures, or internal program data. 

CWE-416:

In result, attackers execute an arbitrary code and read the sensitive information stored in the system and also leads to system crash.

This vulnerability allows function pointers is overwritten with an address to valid shellcode. Attackers taking advantage of this flaw and execute arbitrary code.

CWE-20:

The vulnerability resides in one of the Lenovo application let software improperly validate the input. Attacker taking advantage of this flaw and altered control flow, arbitrary control of a resource, or arbitrary code execution.

Swascan neither disclosed any details about the affected application nor depth information about the Lenovo infrastructure. All the Vulnerabilities are evaluated by the Lenovo security Team and fixed it.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.

Critical WiFi Buffer Overflow Vulnerability Impacts Lenovo Thinkpad Series Laptops

Lenovo Discovered a Backdoor in Network Switches Which Allows Attacker Could Perform DDOS

Lenovo VIBE Mobile Phones Vulnerable to Local Root Privilege Escalation – Its Time to Update your Lenovo Smart Phones

Website

Latest articles

Trustifi’s Email Security Awareness Training – Empowering MSPs to Train & Protect Clients

In today's digital landscape, email security has become a critical concern for businesses of...

Personal Data Exposed in Massive Global Hack: Understanding the Implications & Guarding Privacy- Axios Security Group

In a digital age where information is the new currency, the recent global hack...

Ex-Security Engineer Jailed For Hacking Decentralized Cryptocurrency Exchanges

Ahmed exploited a vulnerability in a decentralized cryptocurrency exchange's smart contract by injecting fabricated...

Omni Hotels & Resorts Hack: Attackers have Stolen Customer Information

Omni Hotels & Resorts has revealed that it was the target of a recent...

Connect:fun Attacking Organizations Running Fortinet’s FortiClient EMS

A new exploit campaign has emerged, targeting organizations that utilize Fortinet’s FortiClient EMS.Dubbed...

TA558 Hackers Compromised 320+ Organizations’ FTP & SMTP Servers

TA558, a financially motivated threat actor identified in 2018, is targeting several countries but...

Blackjack Hackers Destroyed 87,000 Sensors Using Lethal ICS Malware

A group of cybercriminals known as "Blackjack" has launched a devastating attack on industrial...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Top 3 SME Attack Vectors

Securing the Top 3 SME Attack Vectors

Cybercriminals are laying siege to small-to-medium enterprises (SMEs) across sectors. 73% of SMEs know they were breached in 2023. The real rate could be closer to 100%.

  • Stolen credentials
  • Phishing
  • Exploitation of vulnerabilities

Related Articles