Lenovo ThinkStation P700

CPE Details

Lenovo ThinkStation P700
-
2017-08-28
15h40 +00:00
2021-05-06
15h40 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:h:lenovo:thinkstation_p700:-:*:*:*:*:*:*:*

Informations

Vendor

lenovo

Product

thinkstation_p700

Version

-

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2021-3719 2021-11-12 21h05 +00:00 A potential vulnerability in the SMI callback function that saves and restore boot script tables used for resuming from sleep state in some ThinkCentre and ThinkStation models may allow an attacker with local access and elevated privileges to execute arbitrary code.
6.7
Medium
CVE-2020-8321 2020-06-09 19h50 +00:00 A potential vulnerability in the SMI callback function used in the System Lock Preinstallation driver in some Lenovo Notebook and ThinkStation models may allow arbitrary code execution.
6.7
Medium
CVE-2019-6190 2020-02-14 17h10 +00:00 Lenovo was notified of a potential denial of service vulnerability, affecting various versions of BIOS for Lenovo Desktop, Desktop - All in One, and ThinkStation, that could cause PCRs to be cleared intermittently after resuming from sleep (S3) on systems with Intel TXT enabled.
5.5
Medium
CVE-2019-6156 2019-04-10 17h04 +00:00 In Lenovo systems, SMM BIOS Write Protection is used to prevent writes to SPI Flash. While this provides sufficient protection, an additional layer of protection is provided by SPI Protected Range Registers (PRx). Lenovo was notified that after resuming from S3 sleep mode in various versions of BIOS for Lenovo systems, the PRx is not set. This does not impact the SMM BIOS Write Protection, which keeps systems protected.
3.3
Low
CVE-2017-3753 2017-08-10 00h00 +00:00 A vulnerability has been identified in some Lenovo products that use UEFI (BIOS) code developed by American Megatrends, Inc. (AMI). With this vulnerability, conditions exist where an attacker with administrative privileges or physical access to a system may be able to run specially crafted code that can allow them to bypass system protections such as Device Guard and Hyper-V.
6.8
Medium