Lucene search

K
LenovoThinkstation P920 Firmware*

12 matches found

CVE
CVE
added 2021/11/12 10:15 p.m.81 views

CVE-2021-3519

A vulnerability was reported in some Lenovo Desktop models that could allow unauthorized access to the boot menu, when the "BIOS Password At Boot Device List" BIOS setting is Yes.

6.9CVSS6.5AI score0.00034EPSS
CVE
CVE
added 2020/02/14 5:15 p.m.77 views

CVE-2019-6190

Lenovo was notified of a potential denial of service vulnerability, affecting various versions of BIOS for Lenovo Desktop, Desktop - All in One, and ThinkStation, that could cause PCRs to be cleared intermittently after resuming from sleep (S3) on systems with Intel TXT enabled.

5.5CVSS5.3AI score0.00116EPSS
CVE
CVE
added 2020/06/09 8:15 p.m.44 views

CVE-2020-8321

A potential vulnerability in the SMI callback function used in the System Lock Preinstallation driver in some Lenovo Notebook and ThinkStation models may allow arbitrary code execution.

6.7CVSS7AI score0.00137EPSS
CVE
CVE
added 2023/01/30 10:15 p.m.44 views

CVE-2022-40136

An information leak vulnerability in SMI Handler used to configure platform settings over WMI in some Lenovo models may allow an attacker with local access and elevated privileges to read SMM memory.

4.4CVSS4.4AI score0.00043EPSS
CVE
CVE
added 2023/01/30 10:15 p.m.42 views

CVE-2022-34888

The Remote Mount feature can potentially be abused by valid, authenticated users to make connections to internal services that may not normally be accessible to users. Internal service access controls, as applicable, remain in effect.

4.3CVSS4.6AI score0.0006EPSS
CVE
CVE
added 2023/01/30 10:15 p.m.38 views

CVE-2022-34884

A buffer overflow exists in the Remote Presence subsystem which can potentially allow valid, authenticated users to cause a recoverable subsystem denial of service.

7.2CVSS6.5AI score0.00161EPSS
CVE
CVE
added 2023/05/01 3:15 p.m.36 views

CVE-2023-0683

A valid, authenticated XCC user with read only access may gain elevated privileges through a specifically crafted API call.

8.8CVSS8.5AI score0.00313EPSS
CVE
CVE
added 2023/04/28 10:15 p.m.36 views

CVE-2023-29056

A valid LDAP user, under specific conditions, will default to read-only permissions when authenticating into XCC. To be vulnerable, XCC must be configured to use an LDAP server for Authentication/Authorization and have the login permission attribute not defined.

5.9CVSS5.7AI score0.00151EPSS
CVE
CVE
added 2023/04/28 10:15 p.m.35 views

CVE-2023-25495

A valid, authenticated administrative user can query a web interface API to reveal the configured LDAP client password used by XCC to authenticate to an external LDAP server in certain configurations. There is no exposure where no LDAP client password is configured

4.9CVSS5.1AI score0.00068EPSS
CVE
CVE
added 2023/04/28 9:15 p.m.33 views

CVE-2023-29057

A valid XCC user's local account permissions overrides their active directory permissions under specific configurations. This could lead to a privilege escalation. To be vulnerable, LDAP must be configured for authentication/authorization and logins configured as “Local First, then LDAP”.

8.8CVSS8.3AI score0.00117EPSS
CVE
CVE
added 2023/05/01 3:15 p.m.30 views

CVE-2023-25492

A valid, authenticated user may be able to trigger a denial of service of the XCC web user interface or other undefined behavior through a format string injection vulnerability in a web interface API.

8.8CVSS8.3AI score0.00138EPSS
CVE
CVE
added 2023/04/28 9:15 p.m.29 views

CVE-2023-29058

A valid, authenticated XCC user with read-only permissions can modify custom user roles on other user accounts and the user trespass message through the XCC CLI. There is no exposure if SSH is disabled or if there are no users assigned optional read-only permissions.

6.5CVSS6.4AI score0.00059EPSS