Weakness Name | Source | |
---|---|---|
Out-of-bounds Write The product writes data past the end, or before the beginning, of the intended buffer. |
Metrics | Score | Severity | CVSS Vector | Source |
---|---|---|---|---|
V3.1 | 6.7 | MEDIUM |
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
More informations
Base: Exploitabilty MetricsThe Exploitability metrics reflect the characteristics of the thing that is vulnerable, which we refer to formally as the vulnerable component. Attack Vector This metric reflects the context by which vulnerability exploitation is possible. Local The vulnerable component is not bound to the network stack and the attacker’s path is via read/write/execute capabilities. Attack Complexity This metric describes the conditions beyond the attacker’s control that must exist in order to exploit the vulnerability. Low Specialized access conditions or extenuating circumstances do not exist. An attacker can expect repeatable success when attacking the vulnerable component. Privileges Required This metric describes the level of privileges an attacker must possess before successfully exploiting the vulnerability. High The attacker requires privileges that provide significant (e.g., administrative) control over the vulnerable component allowing access to component-wide settings and files. User Interaction This metric captures the requirement for a human user, other than the attacker, to participate in the successful compromise of the vulnerable component. None The vulnerable system can be exploited without interaction from any user. Base: Scope MetricsThe Scope metric captures whether a vulnerability in one vulnerable component impacts resources in components beyond its security scope. Scope Formally, a security authority is a mechanism (e.g., an application, an operating system, firmware, a sandbox environment) that defines and enforces access control in terms of how certain subjects/actors (e.g., human users, processes) can access certain restricted objects/resources (e.g., files, CPU, memory) in a controlled manner. All the subjects and objects under the jurisdiction of a single security authority are considered to be under one security scope. If a vulnerability in a vulnerable component can affect a component which is in a different security scope than the vulnerable component, a Scope change occurs. Intuitively, whenever the impact of a vulnerability breaches a security/trust boundary and impacts components outside the security scope in which vulnerable component resides, a Scope change occurs. Unchanged An exploited vulnerability can only affect resources managed by the same security authority. In this case, the vulnerable component and the impacted component are either the same, or both are managed by the same security authority. Base: Impact MetricsThe Impact metrics capture the effects of a successfully exploited vulnerability on the component that suffers the worst outcome that is most directly and predictably associated with the attack. Analysts should constrain impacts to a reasonable, final outcome which they are confident an attacker is able to achieve. Confidentiality Impact This metric measures the impact to the confidentiality of the information resources managed by a software component due to a successfully exploited vulnerability. High There is a total loss of confidentiality, resulting in all resources within the impacted component being divulged to the attacker. Alternatively, access to only some restricted information is obtained, but the disclosed information presents a direct, serious impact. For example, an attacker steals the administrator's password, or private encryption keys of a web server. Integrity Impact This metric measures the impact to integrity of a successfully exploited vulnerability. Integrity refers to the trustworthiness and veracity of information. High There is a total loss of integrity, or a complete loss of protection. For example, the attacker is able to modify any/all files protected by the impacted component. Alternatively, only some files can be modified, but malicious modification would present a direct, serious consequence to the impacted component. Availability Impact This metric measures the impact to the availability of the impacted component resulting from a successfully exploited vulnerability. High There is a total loss of availability, resulting in the attacker being able to fully deny access to resources in the impacted component; this loss is either sustained (while the attacker continues to deliver the attack) or persistent (the condition persists even after the attack has completed). Alternatively, the attacker has the ability to deny some availability, but the loss of availability presents a direct, serious consequence to the impacted component (e.g., the attacker cannot disrupt existing connections, but can prevent new connections; the attacker can repeatedly exploit a vulnerability that, in each instance of a successful attack, leaks a only small amount of memory, but after repeated exploitation causes a service to become completely unavailable). Temporal MetricsThe Temporal metrics measure the current state of exploit techniques or code availability, the existence of any patches or workarounds, or the confidence in the description of a vulnerability. Environmental MetricsThese metrics enable the analyst to customize the CVSS score depending on the importance of the affected IT asset to a user’s organization, measured in terms of Confidentiality, Integrity, and Availability. |
|
V3.1 | 7.8 | HIGH |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
More informations
Base: Exploitabilty MetricsThe Exploitability metrics reflect the characteristics of the thing that is vulnerable, which we refer to formally as the vulnerable component. Attack Vector This metric reflects the context by which vulnerability exploitation is possible. Local The vulnerable component is not bound to the network stack and the attacker’s path is via read/write/execute capabilities. Attack Complexity This metric describes the conditions beyond the attacker’s control that must exist in order to exploit the vulnerability. Low Specialized access conditions or extenuating circumstances do not exist. An attacker can expect repeatable success when attacking the vulnerable component. Privileges Required This metric describes the level of privileges an attacker must possess before successfully exploiting the vulnerability. Low The attacker requires privileges that provide basic user capabilities that could normally affect only settings and files owned by a user. Alternatively, an attacker with Low privileges has the ability to access only non-sensitive resources. User Interaction This metric captures the requirement for a human user, other than the attacker, to participate in the successful compromise of the vulnerable component. None The vulnerable system can be exploited without interaction from any user. Base: Scope MetricsThe Scope metric captures whether a vulnerability in one vulnerable component impacts resources in components beyond its security scope. Scope Formally, a security authority is a mechanism (e.g., an application, an operating system, firmware, a sandbox environment) that defines and enforces access control in terms of how certain subjects/actors (e.g., human users, processes) can access certain restricted objects/resources (e.g., files, CPU, memory) in a controlled manner. All the subjects and objects under the jurisdiction of a single security authority are considered to be under one security scope. If a vulnerability in a vulnerable component can affect a component which is in a different security scope than the vulnerable component, a Scope change occurs. Intuitively, whenever the impact of a vulnerability breaches a security/trust boundary and impacts components outside the security scope in which vulnerable component resides, a Scope change occurs. Unchanged An exploited vulnerability can only affect resources managed by the same security authority. In this case, the vulnerable component and the impacted component are either the same, or both are managed by the same security authority. Base: Impact MetricsThe Impact metrics capture the effects of a successfully exploited vulnerability on the component that suffers the worst outcome that is most directly and predictably associated with the attack. Analysts should constrain impacts to a reasonable, final outcome which they are confident an attacker is able to achieve. Confidentiality Impact This metric measures the impact to the confidentiality of the information resources managed by a software component due to a successfully exploited vulnerability. High There is a total loss of confidentiality, resulting in all resources within the impacted component being divulged to the attacker. Alternatively, access to only some restricted information is obtained, but the disclosed information presents a direct, serious impact. For example, an attacker steals the administrator's password, or private encryption keys of a web server. Integrity Impact This metric measures the impact to integrity of a successfully exploited vulnerability. Integrity refers to the trustworthiness and veracity of information. High There is a total loss of integrity, or a complete loss of protection. For example, the attacker is able to modify any/all files protected by the impacted component. Alternatively, only some files can be modified, but malicious modification would present a direct, serious consequence to the impacted component. Availability Impact This metric measures the impact to the availability of the impacted component resulting from a successfully exploited vulnerability. High There is a total loss of availability, resulting in the attacker being able to fully deny access to resources in the impacted component; this loss is either sustained (while the attacker continues to deliver the attack) or persistent (the condition persists even after the attack has completed). Alternatively, the attacker has the ability to deny some availability, but the loss of availability presents a direct, serious consequence to the impacted component (e.g., the attacker cannot disrupt existing connections, but can prevent new connections; the attacker can repeatedly exploit a vulnerability that, in each instance of a successful attack, leaks a only small amount of memory, but after repeated exploitation causes a service to become completely unavailable). Temporal MetricsThe Temporal metrics measure the current state of exploit techniques or code availability, the existence of any patches or workarounds, or the confidence in the description of a vulnerability. Environmental MetricsThese metrics enable the analyst to customize the CVSS score depending on the importance of the affected IT asset to a user’s organization, measured in terms of Confidentiality, Integrity, and Availability. |
nvd@nist.gov |
Lenovo>>Ideacentre_c5-14imb05_firmware >> Version To (excluding) o4hkt3aa
Lenovo>>Ideacentre_c5-14imb05 >> Version -
Lenovo>>Ideacentre_3_07ach7_firmware >> Version To (excluding) m4mkt12a
Lenovo>>Ideacentre_3_07ach7 >> Version -
Lenovo>>Ideacentre_3_07iab7_firmware >> Version To (excluding) m49kt21a
Lenovo>>Ideacentre_3_07iab7 >> Version -
Lenovo>>Ideacentre_3-07ada05_firmware >> Version To (excluding) o4fkt35a
Lenovo>>Ideacentre_3-07ada05 >> Version -
Lenovo>>Ideacentre_3-07ada05_firmware >> Version To (excluding) m4mkt12a
Lenovo>>Ideacentre_3-07ada05 >> Version -
Lenovo>>Ideacentre_3-07imb05_firmware >> Version To (excluding) m2vkt1ea
Lenovo>>Ideacentre_3-07imb05 >> Version -
Lenovo>>Ideacentre_5_14iab7_firmware >> Version To (excluding) m42kt42a
Lenovo>>Ideacentre_5_14iab7 >> Version -
Lenovo>>Ideacentre_5-14acn6_firmware >> Version To (excluding) o5ekt24a
Lenovo>>Ideacentre_5-14acn6 >> Version -
Lenovo>>Ideacentre_5-14are05_firmware >> Version To (excluding) o4zkt2aa
Lenovo>>Ideacentre_5-14are05 >> Version -
Lenovo>>Ideacentre_5-14imb05_firmware >> Version To (excluding) o4hkt3aa
Lenovo>>Ideacentre_5-14imb05 >> Version -
Lenovo>>Ideacentre_5-14iob6_firmware >> Version To (excluding) m3gkt3aa
Lenovo>>Ideacentre_5-14iob6 >> Version -
Lenovo>>Ideacentre_aio_3_21itl7_firmware >> Version To (excluding) o5akt33
Lenovo>>Ideacentre_aio_3_21itl7 >> Version -
Lenovo>>Ideacentre_aio_3_22iap7_firmware >> Version To (excluding) o5nkt32a
Lenovo>>Ideacentre_aio_3_22iap7 >> Version -
Lenovo>>Ideacentre_aio_3_24iap7_firmware >> Version To (excluding) o5nkt32a
Lenovo>>Ideacentre_aio_3_24iap7 >> Version -
Lenovo>>Ideacentre_aio_3_27iap7_firmware >> Version To (excluding) o5nkt32a
Lenovo>>Ideacentre_aio_3_27iap7 >> Version -
Lenovo>>Ideacentre_aio_3-22imb05_firmware >> Version To (excluding) o5nkt32a
Lenovo>>Ideacentre_aio_3-22imb05 >> Version -
Lenovo>>Ideacentre_aio_3-22itl6_firmware >> Version To (excluding) o5akt33
Lenovo>>Ideacentre_aio_3-22itl6 >> Version -
Lenovo>>Ideacentre_aio_3-24alc6_firmware >> Version To (excluding) o5bkt25a
Lenovo>>Ideacentre_aio_3-24alc6 >> Version -
Lenovo>>Ideacentre_aio_3-24imb05_firmware >> Version To (excluding) o5nkt32a
Lenovo>>Ideacentre_aio_3-24imb05 >> Version -
Lenovo>>Ideacentre_aio_3-24itl6_firmware >> Version To (excluding) o5akt33
Lenovo>>Ideacentre_aio_3-24itl6 >> Version -
Lenovo>>Ideacentre_aio_3-27alc6_firmware >> Version To (excluding) o5bkt25a
Lenovo>>Ideacentre_aio_3-27alc6 >> Version -
Lenovo>>Ideacentre_aio_3-27imb05_firmware >> Version To (excluding) o5nkt32a
Lenovo>>Ideacentre_aio_3-27imb05 >> Version -
Lenovo>>Ideacentre_aio_3-27itl6_firmware >> Version To (excluding) o5akt33
Lenovo>>Ideacentre_aio_3-27itl6 >> Version -
Lenovo>>Ideacentre_aio_5_24iah7_firmware >> Version To (excluding) o5rkt39a
Lenovo>>Ideacentre_aio_5_24iah7 >> Version -
Lenovo>>Ideacentre_aio_5_27iah7_firmware >> Version To (excluding) o5rkt39a
Lenovo>>Ideacentre_aio_5_27iah7 >> Version -
Lenovo>>Ideacentre_creator_5-14iob6_firmware >> Version To (excluding) m3gkt3aa
Lenovo>>Ideacentre_creator_5-14iob6 >> Version -
Lenovo>>Ideacentre_g5-14amr05_firmware >> Version To (excluding) o4zkt2aa
Lenovo>>Ideacentre_g5-14amr05 >> Version -
Lenovo>>Ideacentre_g5-14imb05_firmware >> Version To (excluding) o4hkt3aa
Lenovo>>Ideacentre_g5-14imb05 >> Version -
Lenovo>>Ideacentre_gaming_5_17acn7_firmware >> Version To (excluding) o5ekt24a
Lenovo>>Ideacentre_gaming_5_17acn7 >> Version -
Lenovo>>Ideacentre_gaming_5_17iab7_firmware >> Version To (excluding) m42kt42a
Lenovo>>Ideacentre_gaming_5_17iab7 >> Version -
Lenovo>>Ideacentre_gaming_5-14acn6_firmware >> Version To (excluding) o5ekt24a
Lenovo>>Ideacentre_gaming_5-14acn6 >> Version -
Lenovo>>Ideacentre_gaming_5-14iob6_firmware >> Version To (excluding) m3gkt3aa
Lenovo>>Ideacentre_gaming_5-14iob6 >> Version -
Lenovo>>Ideacentre_mini_5_01iaq7_firmware >> Version To (excluding) o53kt0ea
Lenovo>>Ideacentre_mini_5_01iaq7 >> Version -
Lenovo>>Ideacentre_mini_5-01imh05_firmware >> Version To (excluding) o4ekt19a
Lenovo>>Ideacentre_mini_5-01imh05 >> Version -
Lenovo>>Legion_c530-19icb_firmware >> Version To (excluding) o4bkt22a
Lenovo>>Legion_c530-19icb >> Version -
Lenovo>>Legion_r5-28imb05_firmware >> Version To (excluding) o4nkt1da
Lenovo>>Legion_r5-28imb05 >> Version -
Lenovo>>Legion_t5-26amr5_firmware >> Version To (excluding) o4mkt2da
Lenovo>>Legion_t5-26amr5 >> Version -
Lenovo>>Legion_t5-26iob6_firmware >> Version To (excluding) o54kt22a
Lenovo>>Legion_t5-26iob6 >> Version -
Lenovo>>Legion_t5-28icb05_firmware >> Version To (excluding) o4bkt22a
Lenovo>>Legion_t5-28icb05 >> Version -
Lenovo>>Legion_t5-28imb05_firmware >> Version To (excluding) o4nkt1da
Lenovo>>Legion_t5-28imb05 >> Version -
Lenovo>>Legion_t530-28icb_firmware >> Version To (excluding) o4bkt22a
Lenovo>>Legion_t530-28icb >> Version -
Lenovo>>Legion_t7-34iaz7_firmware >> Version To (excluding) o5hkt2aa
Lenovo>>Legion_t7-34iaz7 >> Version -
Lenovo>>Legion_t7-34imz5_firmware >> Version To (excluding) o4lkt20a
Lenovo>>Legion_t7-34imz5 >> Version -
Lenovo>>Legion_t7-34imz5_firmware >> Version To (excluding) o5fkt15a
Lenovo>>Legion_t7-34imz5 >> Version -
Lenovo>>Lenovo_legion_t5_26iab7_firmware >> Version To (excluding) o5lkt29a
Lenovo>>Lenovo_legion_t5_26iab7 >> Version -
Lenovo>>Thinkcentre_m600_firmware >> Version To (excluding) m00kt68a
Lenovo>>Thinkcentre_m600 >> Version -
Lenovo>>Thinkcentre_m60e_tiny_firmware >> Version To (excluding) m3skt25a
Lenovo>>Thinkcentre_m60e_tiny >> Version -
Lenovo>>Thinkcentre_m625q_firmware >> Version To (excluding) m1wkt50a
Lenovo>>Thinkcentre_m625q >> Version -
Lenovo>>Thinkcentre_m70c_firmware >> Version To (excluding) m2vkt1ea
Lenovo>>Thinkcentre_m70c >> Version -
Lenovo>>Thinkcentre_m70q_firmware >> Version To (excluding) m2wkt59a
Lenovo>>Thinkcentre_m70q >> Version -
Lenovo>>Thinkcentre_m70q_gen_2_firmware >> Version To (excluding) m3jkt37a
Lenovo>>Thinkcentre_m70q_gen_2 >> Version -
Lenovo>>Thinkcentre_m70q_gen_3_firmware >> Version To (excluding) m43kt1ba
Lenovo>>Thinkcentre_m70q_gen_3 >> Version -
Lenovo>>Thinkcentre_m70s_firmware >> Version To (excluding) m2tkt52a
Lenovo>>Thinkcentre_m70s >> Version -
Lenovo>>Thinkcentre_m70s_gen_3_firmware >> Version To (excluding) m41kt3da
Lenovo>>Thinkcentre_m70s_gen_3 >> Version -
Lenovo>>Thinkcentre_m70t_firmware >> Version To (excluding) m2tkt52a
Lenovo>>Thinkcentre_m70t >> Version -
Lenovo>>Thinkcentre_m70t_gen_3_firmware >> Version To (excluding) m41kt3da
Lenovo>>Thinkcentre_m70t_gen_3 >> Version -
Lenovo>>Thinkcentre_m720e_firmware >> Version To (excluding) m1zkt40a
Lenovo>>Thinkcentre_m720e >> Version -
Lenovo>>Thinkcentre_m720q_firmware >> Version To (excluding) m1ukt70a
Lenovo>>Thinkcentre_m720q >> Version -
Lenovo>>Thinkcentre_m720s_firmware >> Version To (excluding) m1ukt70a
Lenovo>>Thinkcentre_m720s >> Version -
Lenovo>>Thinkcentre_m720t_firmware >> Version To (excluding) m1ukt70a
Lenovo>>Thinkcentre_m720t >> Version -
Lenovo>>Thinkcentre_m725s_firmware >> Version To (excluding) m25kt63a
Lenovo>>Thinkcentre_m725s >> Version -
Lenovo>>Thinkcentre_m75n_firmware >> Version To (excluding) m33kt27a
Lenovo>>Thinkcentre_m75n >> Version -
Lenovo>>Thinkcentre_m75s_gen_2_firmware >> Version To (excluding) m46kt30a
Lenovo>>Thinkcentre_m75s_gen_2 >> Version -
Lenovo>>Thinkcentre_m75s_gen_2_firmware >> Version To (excluding) m3bkt2fa
Lenovo>>Thinkcentre_m75s_gen_2 >> Version -
Lenovo>>Thinkcentre_m75s_gen_2_firmware >> Version To (excluding) m3akt4ca
Lenovo>>Thinkcentre_m75s_gen_2 >> Version -
Lenovo>>Thinkcentre_m75s-1_firmware >> Version To (excluding) m2ckt4fa
Lenovo>>Thinkcentre_m75s-1 >> Version -
Lenovo>>Thinkcentre_m75t_gen_2_firmware >> Version To (excluding) m46kt30a
Lenovo>>Thinkcentre_m75t_gen_2 >> Version -
Lenovo>>Thinkcentre_m75t_gen_2_firmware >> Version To (excluding) m3bkt2fa
Lenovo>>Thinkcentre_m75t_gen_2 >> Version -
Lenovo>>Thinkcentre_m75t_gen_2_firmware >> Version To (excluding) m3akt4ca
Lenovo>>Thinkcentre_m75t_gen_2 >> Version -
Lenovo>>Thinkcentre_m80q_firmware >> Version To (excluding) m2wkt59a
Lenovo>>Thinkcentre_m80q >> Version -
Lenovo>>Thinkcentre_m80q_gen_3_firmware >> Version To (excluding) m4gkt23a
Lenovo>>Thinkcentre_m80q_gen_3 >> Version -
Lenovo>>Thinkcentre_m80s_firmware >> Version To (excluding) m2tkt52a
Lenovo>>Thinkcentre_m80s >> Version -
Lenovo>>Thinkcentre_m80s_gen_3_firmware >> Version To (excluding) m40kt3da
Lenovo>>Thinkcentre_m80s_gen_3 >> Version -
Lenovo>>Thinkcentre_m80t_firmware >> Version To (excluding) m2tkt52a
Lenovo>>Thinkcentre_m80t >> Version -
Lenovo>>Thinkcentre_m80t_gen_3_firmware >> Version To (excluding) m40kt3da
Lenovo>>Thinkcentre_m80t_gen_3 >> Version -
Lenovo>>Thinkcentre_m90a_firmware >> Version To (excluding) m2rkt56a
Lenovo>>Thinkcentre_m90a >> Version -
Lenovo>>Thinkcentre_m90a_gen_2_firmware >> Version To (excluding) m3lkt28a
Lenovo>>Thinkcentre_m90a_gen_2 >> Version -
Lenovo>>Thinkcentre_m90a_gen_3_firmware >> Version To (excluding) m4ikt19a
Lenovo>>Thinkcentre_m90a_gen_3 >> Version -
Lenovo>>Thinkcentre_m90a_pro_gen_3_firmware >> Version To (excluding) m4hkt19a
Lenovo>>Thinkcentre_m90a_pro_gen_3 >> Version -
Lenovo>>Thinkcentre_m90q_gen_2_firmware >> Version To (excluding) m3jkt37a
Lenovo>>Thinkcentre_m90q_gen_2 >> Version -
Lenovo>>Thinkcentre_m90q_gen_3_firmware >> Version To (excluding) m4gkt23a
Lenovo>>Thinkcentre_m90q_gen_3 >> Version -
Lenovo>>Thinkcentre_m90q_tiny_firmware >> Version To (excluding) m2wkt59a
Lenovo>>Thinkcentre_m90q_tiny >> Version -
Lenovo>>Thinkcentre_m90s_firmware >> Version To (excluding) m2tkt52a
Lenovo>>Thinkcentre_m90s >> Version -
Lenovo>>Thinkcentre_m90s_gen_3_firmware >> Version To (excluding) m40kt3da
Lenovo>>Thinkcentre_m90s_gen_3 >> Version -
Lenovo>>Thinkcentre_m90t_firmware >> Version To (excluding) m2tkt52a
Lenovo>>Thinkcentre_m90t >> Version -
Lenovo>>Thinkcentre_m90t_gen_3_firmware >> Version To (excluding) m40kt3da
Lenovo>>Thinkcentre_m90t_gen_3 >> Version -
Lenovo>>Thinkcentre_m920q_firmware >> Version To (excluding) m1ukt70a
Lenovo>>Thinkcentre_m920q >> Version -
Lenovo>>Thinkcentre_m920s_firmware >> Version To (excluding) m1ukt70a
Lenovo>>Thinkcentre_m920s >> Version -
Lenovo>>Thinkcentre_m920t_firmware >> Version To (excluding) m1ukt70a
Lenovo>>Thinkcentre_m920t >> Version -
Lenovo>>Thinkcentre_m920x_firmware >> Version To (excluding) m1ukt70a
Lenovo>>Thinkcentre_m920x >> Version -
Lenovo>>Thinkcentre_m920z_firmware >> Version To (excluding) m1mkt55a
Lenovo>>Thinkcentre_m920z >> Version -
Lenovo>>Thinkcentre_neo_30a_22_gen_3_firmware >> Version To (excluding) o5nkt32a
Lenovo>>Thinkcentre_neo_30a_22_gen_3 >> Version -
Lenovo>>Thinkcentre_neo_30a_24_gen_3_firmware >> Version To (excluding) o5nkt32a
Lenovo>>Thinkcentre_neo_30a_24_gen_3 >> Version -
Lenovo>>Thinkcentre_neo_30a_27_gen_3_firmware >> Version To (excluding) o5nkt32a
Lenovo>>Thinkcentre_neo_30a_27_gen_3 >> Version -
Lenovo>>Thinkcentre_neo_50s_gen_3_firmware >> Version To (excluding) m49kt21a
Lenovo>>Thinkcentre_neo_50s_gen_3 >> Version -
Lenovo>>Thinkcentre_neo_50t_gen_3_firmware >> Version To (excluding) m42kt42a
Lenovo>>Thinkcentre_neo_50t_gen_3 >> Version -
Lenovo>>Thinkcentre_neo_70t_gen_3_firmware >> Version To (excluding) m40kt3da
Lenovo>>Thinkcentre_neo_70t_gen_3 >> Version -
Lenovo>>Thinkcentre_t540-15ama_g_firmware >> Version To (excluding) m2ckt4fa
Lenovo>>Thinkcentre_t540-15ama_g >> Version -
Lenovo>>Ideacentre_510s-07icb_firmware >> Version To (excluding) m22kt49a
Lenovo>>Ideacentre_510s-07icb >> Version -
Lenovo>>Ideacentre_510s-07ick_firmware >> Version To (excluding) m30kt28a
Lenovo>>Ideacentre_510s-07ick >> Version -
Lenovo>>Ideacentre_510s-07ick_firmware >> Version To (excluding) m1zkt40a
Lenovo>>Ideacentre_510s-07ick >> Version -
Lenovo>>Ideacentre_720-18apr_firmware >> Version To (excluding) m25kt63a
Lenovo>>Ideacentre_720-18apr >> Version -
Lenovo>>V30a-22itl_firmware >> Version To (excluding) o5akt33
Lenovo>>V30a-22itl >> Version -
Lenovo>>V30a-24itl_firmware >> Version To (excluding) o5akt33
Lenovo>>V30a-24itl >> Version -
Lenovo>>V35s-07ada_firmware >> Version To (excluding) m4mkt12a
Lenovo>>V35s-07ada >> Version -
Lenovo>>V50s-07imb_firmware >> Version To (excluding) m2vkt1ea
Lenovo>>V50s-07imb >> Version -
Lenovo>>V50t-13imb_firmware >> Version To (excluding) o4hkt3aa
Lenovo>>V50t-13imb >> Version -
Lenovo>>V50t-13iob_g2_firmware >> Version To (excluding) m3gkt3aa
Lenovo>>V50t-13iob_g2 >> Version -
Lenovo>>V530s-07icb_firmware >> Version To (excluding) m22kt49a
Lenovo>>V530s-07icb >> Version -
Lenovo>>V530s-07icr_firmware >> Version To (excluding) m1zkt40a
Lenovo>>V530s-07icr >> Version -
Lenovo>>V55t_gen_2_13acn_firmware >> Version To (excluding) o5jkt23a
Lenovo>>V55t_gen_2_13acn >> Version -
Lenovo>>Thinkstation_p320_firmware >> Version To (excluding) s06kt63a
Lenovo>>Thinkstation_p320 >> Version -
Lenovo>>Thinkstation_p330_tiny_firmware >> Version To (excluding) m1ukt70a
Lenovo>>Thinkstation_p330_tiny >> Version -
Lenovo>>Thinkstation_p330_firmware >> Version To (excluding) m1vkt6fa
Lenovo>>Thinkstation_p330 >> Version -
Lenovo>>Thinkstation_p330_gen_2_firmware >> Version To (excluding) m1vkt6fa
Lenovo>>Thinkstation_p330_gen_2 >> Version -
Lenovo>>Thinkstation_p340_tiny_firmware >> Version To (excluding) m2wkt59a
Lenovo>>Thinkstation_p340_tiny >> Version -
Lenovo>>Thinkstation_p340_firmware >> Version To (excluding) s08kt53a
Lenovo>>Thinkstation_p340 >> Version -
Lenovo>>Thinkstation_p350_tiny_firmware >> Version To (excluding) m3jkt37a
Lenovo>>Thinkstation_p350_tiny >> Version -
Lenovo>>Thinkstation_p350_firmware >> Version To (excluding) s0akt39a
Lenovo>>Thinkstation_p350 >> Version -
Lenovo>>Thinkstation_p360_tiny_firmware >> Version To (excluding) m4gkt23a
Lenovo>>Thinkstation_p360_tiny >> Version -
Lenovo>>Thinkstation_p360_firmware >> Version To (excluding) s0ekt40a
Lenovo>>Thinkstation_p360 >> Version -
Lenovo>>Thinkstation_p360_firmware >> Version To (excluding) s0ekt43a
Lenovo>>Thinkstation_p360 >> Version -