Lenovo System Update (formerly ThinkVantage System Update) before 5.07.0013 allows local users to submit commands to the System Update service (SUService.exe) and gain privileges by launching signed Lenovo executables.
References
| Link | Resource |
|---|---|
| https://support.lenovo.com/us/en/product_security/lsu_privilege | Vendor Advisory |
| https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-018/?fid=7172 | Exploit Third Party Advisory |
| https://support.lenovo.com/us/en/product_security/lsu_privilege | Vendor Advisory |
| https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-018/?fid=7172 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 02:35
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://support.lenovo.com/us/en/product_security/lsu_privilege - Vendor Advisory | |
| References | () https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-018/?fid=7172 - Exploit, Third Party Advisory |
Information
Published : 2017-10-03 01:29
Updated : 2025-04-20 01:37
NVD link : CVE-2015-6971
Mitre link : CVE-2015-6971
CVE.ORG link : CVE-2015-6971
JSON object : View
Products Affected
lenovo
- system_update
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
