Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Lenovo Firmware Vulnerabilities Allow Persistent Implant Deployment

Posted on July 29, 2025July 29, 2025 By CWS

Lenovo units are affected by a number of vulnerabilities, together with ones that might enable attackers to deploy persistent implants on focused programs, firmware safety and provide chain danger administration firm Binarly reported on Tuesday.

Binarly found a complete of six flaws in Lenovo all-in-one desktops, particularly the System Administration Mode (SMM), an working mode designed for low-level system administration.

As a result of SMM masses earlier than the working system and persists throughout reinstallation, it may be an ideal goal for risk actors trying to bypass Safe Boot (the safety function designed to make sure that solely trusted software program is loaded on startup) and deploy stealthy malware.

The vulnerabilities have been assigned the CVE identifiers CVE‑2025‑4421 via CVE‑2025‑4426. 4 of them have a ‘excessive severity’ ranking, whereas the remainder have been categorised as ‘medium severity’.

The high-severity flaws are reminiscence corruption points that may result in privilege escalation and arbitrary code execution within the SMM. The medium-severity vulnerabilities can result in info disclosure and safety mechanism bypasses.

Menace actors which have entry to the focused Lenovo system may exploit the vulnerabilities to bypass SPI flash safeguards and SecureBoot, deploy implants that survive reinstallation of the working system, and even break hypervisor isolation. 

Binarly reported the issues to Lenovo in April and the seller confirmed the findings in June. It has now made accessible patches and mitigations. 

Each Lenovo and Binarly revealed safety advisories describing the vulnerabilities on Tuesday.Commercial. Scroll to proceed studying.

Binarly lately additionally found SMM vulnerabilities affecting Gigabyte firmware. As well as, the corporate confirmed final month how weak UEFI firmware functions from DTResearch, an organization that makes rugged tablets, laptops and different industrial computer systems, might be leveraged to bypass Safe Boot on many units.

Associated: Prototype UEFI Bootkit is South Korean College Mission; LogoFAIL Exploit Found

Associated: PKfail Vulnerability Permits Safe Boot Bypass on Lots of of Laptop Fashions

Associated: Palo Alto Networks Addresses Impression of BIOS, Bootloader Vulnerabilities on Its Firewalls

Security Week News Tags:Deployment, Firmware, Implant, Lenovo, Persistent, Vulnerabilities

Post navigation

Previous Post: Wiz Uncovers Critical Access Bypass Flaw in AI-Powered Vibe Coding Platform Base44
Next Post: Want To Detect Incidents Before It’s Too Late? You Need Threat Intelligence

Related Posts

Anthropic Says Claude AI Powered 90% of Chinese Espionage Campaign Security Week News
Gene Sequencing Giant Illumina Settles for $9.8M Over Product Vulnerabilities Security Week News
Google Patches Gemini Enterprise Vulnerability Exposing Corporate Data  Security Week News
Cisco Patches Critical ISE Vulnerability With Public PoC Security Week News
Canada Gives Hikvision the Boot on National Security Grounds Security Week News
Webinar Today: Breaking AI – Inside the Art of LLM Pen Testing Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Two Ivanti EPMM Zero-Day RCE Flaws Actively Exploited, Security Updates Released
  • Microsoft Releases Update for Windows 11, version 25H2 and 24H2 Systems
  • Exposed Open Directory Leaks BYOB Framework Across Windows, Linux, and macOS
  • Researchers Find 175,000 Publicly Exposed Ollama AI Servers Across 130 Countries
  • Threat Actors Leverage Google Search Ads for ‘Mac Cleaner’ to Direct Users to Malicious Websites

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Two Ivanti EPMM Zero-Day RCE Flaws Actively Exploited, Security Updates Released
  • Microsoft Releases Update for Windows 11, version 25H2 and 24H2 Systems
  • Exposed Open Directory Leaks BYOB Framework Across Windows, Linux, and macOS
  • Researchers Find 175,000 Publicly Exposed Ollama AI Servers Across 130 Countries
  • Threat Actors Leverage Google Search Ads for ‘Mac Cleaner’ to Direct Users to Malicious Websites

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark