If you own a Lenovo laptop, be aware that researchers at ESET have recently discovered a trio of bugs reported to Lenovo that could allow an attacker to disable security features and hijack your operating system.

The issues are tracked as CVE-2022-1890, CVE-2022-1891, and CVE-2022-1892 and are all classed as medium severity level.

The first of these is an issue in the ReadcyBootDxe driver used in some of Lenovo’s products, while the other two are overflow bugs in the SystemLoadDefaultDxe driver.

Unfortunately, the issue is quite widespread, as the SystemLoadDefaultDxe driver is used in more than 70 different Lenovo models. That includes everything in the IdeaPad, Flex, ThinkBook, V14, V15, V130, Slim, S145, S540, S940, and Yoga product lines.

The company has issued a formal advisory regarding the issue and has a complete listing of all their products impacted by these flaws on their website.

ESET had this to say about their recent discovery:

“These vulnerabilities were caused by insufficient validation of DataSize parameter passed to the UEFI Runtime Services function GetVariable.  An attacker could create a specially crafted NVRAM variable, causing buffer overflow of the Data buffer in the second GetVariable call.”

If there’s a silver lining to be found here, it lies in the fact that exploiting these flaws is not a trivial task and requires a skillset that is likely beyond a great many of the world’s hackers.

That does not mean that you are safe. You are very much at risk. The good news though is that at least a casual or relatively inexperienced hacker will not be able to easily exploit these weaknesses.  They’re still well worth keeping on your company’s radar, however.

One final note to be aware of is that if you’re having trouble determining whether your Lenovo is on the vulnerable list, the company has published a website that auto-detects for the vulnerability.  It is hands down the fastest way to find out for sure. Good luck out there!

Related Posts - TKS Blog

TKS Newsletter - 2025 April
Here's our April 2025 Newsletter Read the full PDF version here: The TKS Sentinel - April Issue In this month's edition, we discuss: Fake Google Ads Insider...
Read more
TKS Newsletter - 2025 March
Here's our March 2025 Newsletter Read the full PDF version here: The TKS Sentinel - March Issue In this month's edition, we discuss: Cybersecurity Planning Microsoft Trashes...
Read more
failovers and failback strategyfailovers and failback strategy
Mastering Failover and Failback
Businesses face a constant threat of unexpected disruptions on a regular basis. Whether it's a cyberattack, natural disaster, or power outage, downtime can lead to...
Read more
data protectiondata protection
Managed Backup: Why Business Leaders Must Prioritize Data Protection
Why Managed Backup is Critical for Business Success As businesses become increasingly reliant on digital operations, prioritizing data security and continuity is more critical than ever....
Read more

Used with permission from Article Aggregator