Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Lenovo Firmware Vulnerabilities Allow Persistent Implant Deployment

Posted on July 29, 2025July 29, 2025 By CWS

Lenovo units are affected by a number of vulnerabilities, together with ones that might enable attackers to deploy persistent implants on focused programs, firmware safety and provide chain danger administration firm Binarly reported on Tuesday.

Binarly found a complete of six flaws in Lenovo all-in-one desktops, particularly the System Administration Mode (SMM), an working mode designed for low-level system administration.

As a result of SMM masses earlier than the working system and persists throughout reinstallation, it may be an ideal goal for risk actors trying to bypass Safe Boot (the safety function designed to make sure that solely trusted software program is loaded on startup) and deploy stealthy malware.

The vulnerabilities have been assigned the CVE identifiers CVE‑2025‑4421 via CVE‑2025‑4426. 4 of them have a ‘excessive severity’ ranking, whereas the remainder have been categorised as ‘medium severity’.

The high-severity flaws are reminiscence corruption points that may result in privilege escalation and arbitrary code execution within the SMM. The medium-severity vulnerabilities can result in info disclosure and safety mechanism bypasses.

Menace actors which have entry to the focused Lenovo system may exploit the vulnerabilities to bypass SPI flash safeguards and SecureBoot, deploy implants that survive reinstallation of the working system, and even break hypervisor isolation. 

Binarly reported the issues to Lenovo in April and the seller confirmed the findings in June. It has now made accessible patches and mitigations. 

Each Lenovo and Binarly revealed safety advisories describing the vulnerabilities on Tuesday.Commercial. Scroll to proceed studying.

Binarly lately additionally found SMM vulnerabilities affecting Gigabyte firmware. As well as, the corporate confirmed final month how weak UEFI firmware functions from DTResearch, an organization that makes rugged tablets, laptops and different industrial computer systems, might be leveraged to bypass Safe Boot on many units.

Associated: Prototype UEFI Bootkit is South Korean College Mission; LogoFAIL Exploit Found

Associated: PKfail Vulnerability Permits Safe Boot Bypass on Lots of of Laptop Fashions

Associated: Palo Alto Networks Addresses Impression of BIOS, Bootloader Vulnerabilities on Its Firewalls

Security Week News Tags:Deployment, Firmware, Implant, Lenovo, Persistent, Vulnerabilities

Post navigation

Previous Post: Wiz Uncovers Critical Access Bypass Flaw in AI-Powered Vibe Coding Platform Base44
Next Post: Want To Detect Incidents Before It’s Too Late? You Need Threat Intelligence

Related Posts

Will AI-SPM Become the Standard Security Layer for Safe AI Adoption? Security Week News
AI Supply Chain Attack Method Demonstrated Against Google, Microsoft Products Security Week News
Mikko Hypponen Leaves Anti-Malware Industry to Fight Against Drones Security Week News
Adobe Patches Critical Vulnerability in Connect Collaboration Suite Security Week News
Cyberstarts Launches $300M Liquidity Fund to Help Startups Retain Top Talent Security Week News
Clorox Sues Cognizant for $380 Million Over 2023 Hack Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Google Wear OS Message App Vulnerability Let Any Installed App To Send SMS Behalf Of User
  • CISA Warns of Exploited DELMIA Factory Software Vulnerabilities
  • New Attack Targets DDR5 Memory to Steal Keys From Intel and AMD TEEs 
  • Active Exploits Hit Dassault and XWiki — CISA Confirms Critical Flaws Under Attack
  • Microsoft Details ASP.NET Vulnerability That Enables Attackers To Smuggle HTTP Requests

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Google Wear OS Message App Vulnerability Let Any Installed App To Send SMS Behalf Of User
  • CISA Warns of Exploited DELMIA Factory Software Vulnerabilities
  • New Attack Targets DDR5 Memory to Steal Keys From Intel and AMD TEEs 
  • Active Exploits Hit Dassault and XWiki — CISA Confirms Critical Flaws Under Attack
  • Microsoft Details ASP.NET Vulnerability That Enables Attackers To Smuggle HTTP Requests

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News