Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Lenovo Firmware Vulnerabilities Allow Persistent Implant Deployment

Posted on July 29, 2025July 29, 2025 By CWS

Lenovo units are affected by a number of vulnerabilities, together with ones that might enable attackers to deploy persistent implants on focused programs, firmware safety and provide chain danger administration firm Binarly reported on Tuesday.

Binarly found a complete of six flaws in Lenovo all-in-one desktops, particularly the System Administration Mode (SMM), an working mode designed for low-level system administration.

As a result of SMM masses earlier than the working system and persists throughout reinstallation, it may be an ideal goal for risk actors trying to bypass Safe Boot (the safety function designed to make sure that solely trusted software program is loaded on startup) and deploy stealthy malware.

The vulnerabilities have been assigned the CVE identifiers CVE‑2025‑4421 via CVE‑2025‑4426. 4 of them have a ‘excessive severity’ ranking, whereas the remainder have been categorised as ‘medium severity’.

The high-severity flaws are reminiscence corruption points that may result in privilege escalation and arbitrary code execution within the SMM. The medium-severity vulnerabilities can result in info disclosure and safety mechanism bypasses.

Menace actors which have entry to the focused Lenovo system may exploit the vulnerabilities to bypass SPI flash safeguards and SecureBoot, deploy implants that survive reinstallation of the working system, and even break hypervisor isolation. 

Binarly reported the issues to Lenovo in April and the seller confirmed the findings in June. It has now made accessible patches and mitigations. 

Each Lenovo and Binarly revealed safety advisories describing the vulnerabilities on Tuesday.Commercial. Scroll to proceed studying.

Binarly lately additionally found SMM vulnerabilities affecting Gigabyte firmware. As well as, the corporate confirmed final month how weak UEFI firmware functions from DTResearch, an organization that makes rugged tablets, laptops and different industrial computer systems, might be leveraged to bypass Safe Boot on many units.

Associated: Prototype UEFI Bootkit is South Korean College Mission; LogoFAIL Exploit Found

Associated: PKfail Vulnerability Permits Safe Boot Bypass on Lots of of Laptop Fashions

Associated: Palo Alto Networks Addresses Impression of BIOS, Bootloader Vulnerabilities on Its Firewalls

Security Week News Tags:Deployment, Firmware, Implant, Lenovo, Persistent, Vulnerabilities

Post navigation

Previous Post: Wiz Uncovers Critical Access Bypass Flaw in AI-Powered Vibe Coding Platform Base44
Next Post: Want To Detect Incidents Before It’s Too Late? You Need Threat Intelligence

Related Posts

Hackers Start Exploiting Critical Cisco ISE Vulnerabilities Security Week News
Ivanti, Fortinet, Splunk Release Security Updates Security Week News
Linux Security: New Flaws Allow Root Access, CISA Warns of Old Bug Exploitation Security Week News
Paragon ‘Graphite’ Spyware Linked to Zero-Click Hacks on Newest iPhones Security Week News
Cityworks Zero-Day Exploited by Chinese Hackers in US Local Government Attacks Security Week News
Booz Allen Invests in Machine Identity Firm Corsha Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • AI Vibe Coding Platform Hacked
  • BulletProof Hosting Provider Qwins Ltd Fueling Global Malware Campaigns
  • How to Respond to a Sextortion Threat
  • Senate Committee Advances Trump Nominee to Lead CISA
  • ToxicPanda Android Banking Malware Infected 4500+ Devices to Steal Banking Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • AI Vibe Coding Platform Hacked
  • BulletProof Hosting Provider Qwins Ltd Fueling Global Malware Campaigns
  • How to Respond to a Sextortion Threat
  • Senate Committee Advances Trump Nominee to Lead CISA
  • ToxicPanda Android Banking Malware Infected 4500+ Devices to Steal Banking Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News