Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Lenovo Firmware Vulnerabilities Allow Persistent Implant Deployment

Posted on July 29, 2025July 29, 2025 By CWS

Lenovo units are affected by a number of vulnerabilities, together with ones that might enable attackers to deploy persistent implants on focused programs, firmware safety and provide chain danger administration firm Binarly reported on Tuesday.

Binarly found a complete of six flaws in Lenovo all-in-one desktops, particularly the System Administration Mode (SMM), an working mode designed for low-level system administration.

As a result of SMM masses earlier than the working system and persists throughout reinstallation, it may be an ideal goal for risk actors trying to bypass Safe Boot (the safety function designed to make sure that solely trusted software program is loaded on startup) and deploy stealthy malware.

The vulnerabilities have been assigned the CVE identifiers CVE‑2025‑4421 via CVE‑2025‑4426. 4 of them have a ‘excessive severity’ ranking, whereas the remainder have been categorised as ‘medium severity’.

The high-severity flaws are reminiscence corruption points that may result in privilege escalation and arbitrary code execution within the SMM. The medium-severity vulnerabilities can result in info disclosure and safety mechanism bypasses.

Menace actors which have entry to the focused Lenovo system may exploit the vulnerabilities to bypass SPI flash safeguards and SecureBoot, deploy implants that survive reinstallation of the working system, and even break hypervisor isolation. 

Binarly reported the issues to Lenovo in April and the seller confirmed the findings in June. It has now made accessible patches and mitigations. 

Each Lenovo and Binarly revealed safety advisories describing the vulnerabilities on Tuesday.Commercial. Scroll to proceed studying.

Binarly lately additionally found SMM vulnerabilities affecting Gigabyte firmware. As well as, the corporate confirmed final month how weak UEFI firmware functions from DTResearch, an organization that makes rugged tablets, laptops and different industrial computer systems, might be leveraged to bypass Safe Boot on many units.

Associated: Prototype UEFI Bootkit is South Korean College Mission; LogoFAIL Exploit Found

Associated: PKfail Vulnerability Permits Safe Boot Bypass on Lots of of Laptop Fashions

Associated: Palo Alto Networks Addresses Impression of BIOS, Bootloader Vulnerabilities on Its Firewalls

Security Week News Tags:Deployment, Firmware, Implant, Lenovo, Persistent, Vulnerabilities

Post navigation

Previous Post: Wiz Uncovers Critical Access Bypass Flaw in AI-Powered Vibe Coding Platform Base44
Next Post: Want To Detect Incidents Before It’s Too Late? You Need Threat Intelligence

Related Posts

ToolShell Attacks Hit 400+ SharePoint Servers, US Government Victims Named Security Week News
Infostealers: The Silent Smash-and-Grab Driving Modern Cybercrime Security Week News
Organizations Warned of Interlock Ransomware Attacks Security Week News
Apple Sends Fresh Wave of Spyware Notifications to French Users Security Week News
Canadian Airline WestJet Hit by Cyberattack Security Week News
Recent SAP S/4HANA Vulnerability Exploited in Attacks Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • What Are The Takeaways from The Scattered Lapsus $Hunters Statement?
  • ChatGPT’s New Support for MCP Tools Let Attackers Exfiltrate All Private Details From Email
  • How to Use Threat Intelligence Feeds
  • Sidewinder Hacker Group Weaponizing LNK File to Execute Malicious Scripts
  • AI-powered Pentesting Tool ‘Villager’ Combines Kali Linux Tools with DeepSeek AI for Automated Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • What Are The Takeaways from The Scattered Lapsus $Hunters Statement?
  • ChatGPT’s New Support for MCP Tools Let Attackers Exfiltrate All Private Details From Email
  • How to Use Threat Intelligence Feeds
  • Sidewinder Hacker Group Weaponizing LNK File to Execute Malicious Scripts
  • AI-powered Pentesting Tool ‘Villager’ Combines Kali Linux Tools with DeepSeek AI for Automated Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News