Vulnerabilities > Lenovo > Thinkstation P720 Firmware
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-01-30 | CVE-2022-40136 | Out-of-bounds Read vulnerability in Lenovo products An information leak vulnerability in SMI Handler used to configure platform settings over WMI in some Lenovo models may allow an attacker with local access and elevated privileges to read SMM memory. | 4.4 |
2021-11-12 | CVE-2021-3519 | Improper Authentication vulnerability in Lenovo products A vulnerability was reported in some Lenovo Desktop models that could allow unauthorized access to the boot menu, when the "BIOS Password At Boot Device List" BIOS setting is Yes. | 6.8 |
2020-06-09 | CVE-2020-8321 | Unspecified vulnerability in Lenovo products A potential vulnerability in the SMI callback function used in the System Lock Preinstallation driver in some Lenovo Notebook and ThinkStation models may allow arbitrary code execution. | 6.7 |
2020-02-14 | CVE-2019-6190 | Improper Initialization vulnerability in Lenovo products Lenovo was notified of a potential denial of service vulnerability, affecting various versions of BIOS for Lenovo Desktop, Desktop - All in One, and ThinkStation, that could cause PCRs to be cleared intermittently after resuming from sleep (S3) on systems with Intel TXT enabled. | 5.5 |
2019-06-13 | CVE-2019-0130 | Cross-site Scripting vulnerability in multiple products Reflected XSS in web interface for Intel(R) Accelerated Storage Manager in Intel(R) RSTe before version 5.5.0.2015 may allow an unauthenticated user to potentially enable denial of service via network access. | 7.4 |
2019-04-10 | CVE-2019-6156 | Improper Locking vulnerability in Lenovo products In Lenovo systems, SMM BIOS Write Protection is used to prevent writes to SPI Flash. | 3.3 |
2019-03-14 | CVE-2019-0135 | Permissions, Privileges, and Access Controls vulnerability in multiple products Improper permissions in the installer for Intel(R) Accelerated Storage Manager in Intel(R) RSTe before version 5.5.0.2015 may allow an authenticated user to potentially enable escalation of privilege via local access. | 7.8 |