Importantly, because Lenovo did not develop the vulnerable SMM code and is still in the process of determining the identity of the original author, it does not know its originally intended purpose,” Lenovo said in its statement. “The package of code with the SMM vulnerability was developed on top of a common code base provided to the IBV by Intel. Lenovo responded last week that its investigation is ongoing and that the vulnerable System Management Mode code was written by Intel and came to Lenovo from one of its BIOS vendors these suppliers take original chip code from Intel and AMD and customize them to work with specific computers. An attacker would also be able to shut down other security protections such as Secure Boot or bypass Virtual Secure Mode, including Credential Guard, on Windows 10 machines. Oleksiuk published proof-of-concept exploit code for the vulnerability last week along with his disclosure.Īn attacker exploiting the vulnerability will gain privileges that will allow them to run arbitrary code in System Management mode and potentially disable flash write protection which defends against code execution. “Vulnerability is present in all of the ThinkPad series laptops, the oldest one that I have checked is X220 and the newest one is T450s (with latest firmware versions available at this moment),” Oleksiuk wrote on a Github entry. Oleksiuk said the flaw, which he calls ThinkPwn, is in the SystemSmmRuntimeRt UEFI driver, which he found on firmware in Lenovo ThinkPad laptops. The flaw was publicly disclosed last week by researcher Dmytro Oleksiuk. A serious hardware vulnerability, thought to be confined to UEFI drivers in Lenovo and HP laptops, has also been found in firmware running on motherboards sold by Gigabyte.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |