Over 100 laptop models have been discovered, and the company has issued firmware patches

Over 100 laptop models have been discovered, and the company has issued firmware patches ...

ESET researchers discovered three vulnerabilities in the UEFI Secure Boot protocol, which was designed to verify and load trusted code when the laptop was booted. These vulnerabilities were promptly disclosed to Lenovo in October 2021. Three of the vulnerabilities were officially confirmed by the company and were assigned three CVEs (Common Vulnerabilities and Exposures) CVE-2021-3970, CVE-2021-3971, and CVE-2021-3972, and a security advisory was published by the manufacturer on Monday.

Two of the vulnerabilities CVE-2021-3971 (SecureBackDoor) and CVE-2021-3972 (ChgBootDxeHook) have been investigated by ESET after two UEFI firmware drivers were accidentally included in the firmware. These drivers can be used only when working the laptop and to disrupt the UEFI Secure Boot feature and protect the operating system. Security software and other solutions on the system will be unable to detect these threats early in the boot process.

So, UEFI threats like ESET were able to bypass these systems to execute their malicious code, according to the researchers. HP firmware was also discovered.

According to ESET, the third security flaw or CVE-2021-3970 (LenovoVariableSmm) might lead to arbitrary code execution in system management RAM (or SMRAM) without elevated privileges. In some cases, the attacker must have local access to the device, but it is worthwhile to note that Lenovo has assigned the flaws to a Medium severity level in its advisory.

  • Apple Misses Fixing Zero-Day Issues in macOS Big Sur, Catalina
  • Samsung Galaxy Devices to Receive a Patch for Dirty Pipe Vulnerability

According to ESET experts, over 100 consumer laptop models have been affected by security flaws. Users who own Lenovo''s Advisory website can download the latest firmware update for their laptop. However, several other affected devices will not be fixed as they have reached End of Development Support (EODS). These users may also use a TPM-aware full-disk encryption to make disk data unaccessible if the UEFI Secure Boot configuration has been modified.