CVE Vulnerabilities for Lenovo System Update
CVE | Published | Severity | Details | Exploitability | Impact | Vector |
---|---|---|---|---|---|---|
CVE‑2023‑4632 | 2023‑11‑08 22:15:11 | HIGH (8) | An uncontrolled search path vulnerability was reported in Lenovo System Update that could allow an attacker with local access to execute code with elevated privileges. | 2 | 6 | LOCAL |
CVE‑2022‑4568 | 2023‑05‑01 15:15:09 | HIGH (7) | A directory permissions management vulnerability in Lenovo System Update may allow elevation of privileges. | 1 | 6 | LOCAL |
CVE‑2022‑0354 | 2022‑04‑22 21:15:10 | HIGH (8) | A vulnerability was reported in Lenovo System Update that could allow a local user with interactive system access the ability to execute code with elevated privileges only during the installation of a System Update package released before 2022-02-25 that displays a command prompt window. | 2 | 6 | LOCAL |
CVE‑2020‑8342 | 2020‑09‑15 15:15:14 | HIGH (7) | A race condition vulnerability was reported in Lenovo System Update prior to version 5.07.0106 that could allow escalation of privilege. | 1 | 6 | LOCAL |
CVE‑2019‑6175 | 2019‑09‑26 16:15:12 | HIGH (8) | A denial of service vulnerability was reported in Lenovo System Update versions prior to 5.07.0088 that could allow configuration files to be written to non-standard locations. | 4 | 4 | NETWORK |
CVE‑2019‑6163 | 2019‑06‑26 14:15:10 | MEDIUM (5) | A denial of service vulnerability was reported in Lenovo System Update before version 5.07.0084 that could allow service log files to be written to non-standard locations. | 0 | 0 | NETWORK |
CVE‑2018‑9063 | 2018‑05‑04 17:29:01 | MEDIUM (5) | MapDrv (C:\Program Files\Lenovo\System Update\mapdrv.exe) In Lenovo System Update versions earlier than 5.07.0072 contains a local vulnerability where an attacker entering very large user ID or password can overrun the program's buffer, causing undefined behaviors, such as execution of arbitrary code. No additional privilege is granted to the attacker beyond what is already possessed to run MapDrv. | 0 | 0 | LOCAL |
CVE‑2015‑8110 | 2017‑04‑24 06:59:01 | HIGH (7) | Lenovo System Update (formerly ThinkVantage System Update) before 5.07.0019 allows local users to gain privileges by navigating to (1) "Click here to learn more" or (2) "View privacy policy" within the Tvsukernel.exe GUI application in the context of a temporary administrator account, aka a "local privilege escalation vulnerability." | 0 | 0 | LOCAL |
CVE‑2015‑8109 | 2017‑04‑24 06:59:01 | MEDIUM (7) | Lenovo System Update (formerly ThinkVantage System Update) before 5.07.0019 allows local users to gain privileges by making a prediction of tvsu_tmp_xxxxxXXXXX account credentials that requires knowledge of the time that this account was created, aka a "temporary administrator account vulnerability." | 0 | 0 | LOCAL |
CVE‑2015‑7336 | 2020‑03‑27 15:15:12 | HIGH (8) | MITRE is populating this ID because it was assigned prior to Lenovo becoming a CNA. A vulnerability was reported (fixed and publicly disclosed in 2015) in Lenovo System Update version 5.07.0008 and prior that could allow the signature check of an update to be bypassed. | 4 | 4 | NETWORK |
CVE‑2015‑7335 | 2020‑03‑27 15:15:12 | HIGH (7) | MITRE is populating this ID because it was assigned prior to Lenovo becoming a CNA. A race condition was reported (fixed and publicly disclosed in 2015) in Lenovo System Update version 5.07.0008 and prior that could allow a user to execute arbitrary code with elevated privileges. | 1 | 6 | LOCAL |
CVE‑2015‑7334 | 2020‑03‑27 15:15:12 | HIGH (8) | MITRE is populating this ID because it was assigned prior to Lenovo becoming a CNA. A local privilege escalation vulnerability was reported (fixed and publicly disclosed in 2015) in Lenovo System Update version 5.07.0008 and prior where the SUService.exe /type COMMAND type could allow a user to execute arbitrary code with elevated privileges. | 2 | 6 | LOCAL |
CVE‑2015‑7333 | 2020‑03‑27 15:15:12 | HIGH (8) | MITRE is populating this ID because it was assigned prior to Lenovo becoming a CNA. A local privilege escalation vulnerability was reported (fixed and publicly disclosed in 2015) in Lenovo System Update version 5.07.0008 and prior where the SUService.exe /type INF and INF_BY_COMPATIBLE_ID command types could allow a user to execute arbitrary code with elevated privileges. | 2 | 6 | LOCAL |
CVE‑2015‑6971 | 2017‑10‑03 01:29:01 | HIGH (7) | Lenovo System Update (formerly ThinkVantage System Update) before 5.07.0013 allows local users to submit commands to the System Update service (SUService.exe) and gain privileges by launching signed Lenovo executables. | 0 | 0 | LOCAL |
CVE‑2015‑2234 | 2015‑05‑12 19:59:15 | MEDIUM (7) | Race condition in Lenovo System Update (formerly ThinkVantage System Update) before 5.06.0034 uses world-writable permissions for the update files directory, which allows local users to gain privileges by writing to an update file after the signature is validated. | 0 | 0 | LOCAL |
CVE‑2015‑2233 | 2015‑05‑12 19:59:14 | HIGH (8) | Lenovo System Update (formerly ThinkVantage System Update) before 5.06.0034 does not properly validate CA chains during signature validation, which allows man-in-the-middle attackers to upload and execute arbitrary files via a crafted certificate. | 0 | 0 | ADJACENT_NETWORK |
CVE‑2015‑2219 | 2015‑05‑12 19:59:11 | HIGH (7) | Lenovo System Update (formerly ThinkVantage System Update) before 5.06.0034 uses predictable security tokens, which allows local users to gain privileges by sending a valid token with a command to the System Update service (SUService.exe) through an unspecified named pipe. | 0 | 0 | LOCAL |
View OS-specific patching for:
Windows Mac Linux
Logos, products, trade names, and company names are all the property of their respective trademark holders.
The above listing includes products that Lavawall® monitors through public information and/or proprietary statistical analysis.
Although we do have a partner relationship with some of the listed products and companies, they do not necessarily endorse Lavawall® or have integrations with our systems.