Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Lenovo Firmware Vulnerabilities Allow Persistent Implant Deployment

Posted on July 29, 2025July 29, 2025 By CWS

Lenovo units are affected by a number of vulnerabilities, together with ones that might enable attackers to deploy persistent implants on focused programs, firmware safety and provide chain danger administration firm Binarly reported on Tuesday.

Binarly found a complete of six flaws in Lenovo all-in-one desktops, particularly the System Administration Mode (SMM), an working mode designed for low-level system administration.

As a result of SMM masses earlier than the working system and persists throughout reinstallation, it may be an ideal goal for risk actors trying to bypass Safe Boot (the safety function designed to make sure that solely trusted software program is loaded on startup) and deploy stealthy malware.

The vulnerabilities have been assigned the CVE identifiers CVE‑2025‑4421 via CVE‑2025‑4426. 4 of them have a ‘excessive severity’ ranking, whereas the remainder have been categorised as ‘medium severity’.

The high-severity flaws are reminiscence corruption points that may result in privilege escalation and arbitrary code execution within the SMM. The medium-severity vulnerabilities can result in info disclosure and safety mechanism bypasses.

Menace actors which have entry to the focused Lenovo system may exploit the vulnerabilities to bypass SPI flash safeguards and SecureBoot, deploy implants that survive reinstallation of the working system, and even break hypervisor isolation. 

Binarly reported the issues to Lenovo in April and the seller confirmed the findings in June. It has now made accessible patches and mitigations. 

Each Lenovo and Binarly revealed safety advisories describing the vulnerabilities on Tuesday.Commercial. Scroll to proceed studying.

Binarly lately additionally found SMM vulnerabilities affecting Gigabyte firmware. As well as, the corporate confirmed final month how weak UEFI firmware functions from DTResearch, an organization that makes rugged tablets, laptops and different industrial computer systems, might be leveraged to bypass Safe Boot on many units.

Associated: Prototype UEFI Bootkit is South Korean College Mission; LogoFAIL Exploit Found

Associated: PKfail Vulnerability Permits Safe Boot Bypass on Lots of of Laptop Fashions

Associated: Palo Alto Networks Addresses Impression of BIOS, Bootloader Vulnerabilities on Its Firewalls

Security Week News Tags:Deployment, Firmware, Implant, Lenovo, Persistent, Vulnerabilities

Post navigation

Previous Post: Wiz Uncovers Critical Access Bypass Flaw in AI-Powered Vibe Coding Platform Base44
Next Post: Want To Detect Incidents Before It’s Too Late? You Need Threat Intelligence

Related Posts

Apple Patches 19 WebKit Vulnerabilities  Security Week News
Pennsylvania Attorney General Confirms Ransomware Behind Weeks-Long Outage Security Week News
UK’s Ransomware Payment Ban: Bold Strategy or Dangerous Gamble? Security Week News
Terra Security Raises $30 Million for AI Penetration Testing Platform Security Week News
Hackers Steal Sensitive Data From Auction House Sotheby’s Security Week News
Radiflow Unveils New OT Security Platform Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New GhostPairing Attack Let Attackers Gain Full Access in WhatsApp with Phone Number
  • React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors
  • Critical FortiGate Devices SSO Vulnerabilities Actively Exploited in the Wild
  • PornHub Breached by ShinyHunters Group and Premium Members Data Stolen
  • Google to Shut Down Dark Web Monitoring Tool in February 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New GhostPairing Attack Let Attackers Gain Full Access in WhatsApp with Phone Number
  • React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors
  • Critical FortiGate Devices SSO Vulnerabilities Actively Exploited in the Wild
  • PornHub Breached by ShinyHunters Group and Premium Members Data Stolen
  • Google to Shut Down Dark Web Monitoring Tool in February 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark