Attacker Value
Unknown
0
CVE-2023-43579
0
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2023-43579
(Last updated November 16, 2023) ▾
MITRE ATT&CK
Log in to add MITRE ATT&CK tag
Add MITRE ATT&CK tactics and techniques that apply to this CVE.
MITRE ATT&CK
Select the MITRE ATT&CK Tactics that apply to this CVE
Collection
Select any Techniques used:
Command and Control
Select any Techniques used:
Credential Access
Select any Techniques used:
Defense Evasion
Select any Techniques used:
Discovery
Select any Techniques used:
Execution
Select any Techniques used:
Exfiltration
Select any Techniques used:
Impact
Select any Techniques used:
Initial Access
Select any Techniques used:
Lateral Movement
Select any Techniques used:
Persistence
Select any Techniques used:
Privilege Escalation
Select any Techniques used:
Topic Tags
Select the tags that apply to this CVE (Assessment added tags are disabled and cannot be removed)
What makes this of high-value to an attacker?
What makes this of low-value to an attacker?
Description
A buffer overflow was reported in the SmuV11Dxe driver in some Lenovo Desktop products that may allow a local attacker with elevated privileges to execute arbitrary code.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
Data provided by the National Vulnerability Database (NVD)
Base Score:
6.7 Medium
Impact Score:
5.9
Exploitability Score:
0.8
Attack Vector (AV):
Local
Attack Complexity (AC):
Low
Privileges Required (PR):
High
User Interaction (UI):
None
Scope (S):
Unchanged
Confidentiality (C):
High
Integrity (I):
High
Availability (A):
High
General Information
Offensive Application
Unknown
Utility Class
Unknown
Ports
Unknown
OS
Unknown
Vulnerable Versions
Desktop BIOS various
Prerequisites
Unknown
Discovered By
Unknown
PoC Author
Unknown
Metasploit Module
Unknown
Reporter
Unknown
Vendors
Products
- ideacentre 3 07ada05 firmware
- ideacentre 3 07imb05 firmware
- ideacentre 5 14iab7 firmware
- ideacentre 5 14irb8 firmware
- ideacentre 5 14acn6 firmware
- ideacentre 5 14imb05 firmware
- ideacentre 5 14iob6 firmware
- ideacentre aio 3 21itl7 firmware
- ideacentre aio 3 22iap7 firmware
- ideacentre aio 3 24iap7 firmware
- ideacentre aio 3 27iap7 firmware
- ideacentre aio 3 22iil5 firmware
- ideacentre aio 3 22imb05 firmware
- ideacentre aio 3 22itl6 firmware
- ideacentre aio 3 24alc6 firmware
- ideacentre aio 3 24iil5 firmware
- ideacentre aio 3 24imb05 firmware
- ideacentre aio 3 24itl6 firmware
- ideacentre aio 3 27imb05 firmware
- ideacentre aio 3 27itl6 firmware
- ideacentre aio 5 24iah7 firmware
- ideacentre aio 5 27iah7 firmware
- ideacentre c5 14imb05 firmware
- ideacentre creator 5 14iob6 firmware
- ideacentre g5 14amr05 firmware
- ideacentre g5 14imb05 firmware
- ideacentre gaming 5 17acn7 firmware
- ideacentre gaming 5 17iab7 firmware
- ideacentre gaming 5 14acn6 firmware
- ideacentre gaming 5 14iob6 firmware
- ideacentre mini 5 01iaq7 firmware
- ideacentre mini 5 01imh05 firmware
- ideacentre t540 15ama g firmware
- legion t5 26iab7 firmware
- legion t5 26irb8 firmware
- legion t7 34irz8 firmware
- legion t7 34iaz7 firmware
- legion t7 34imz5 firmware
- loq 17irb8 firmware
- thinkcentre m625q firmware
- thinkcentre m630e firmware
- thinkcentre m70a gen 3 firmware
- thinkcentre m70c firmware
- thinkcentre m70q firmware
- thinkcentre m70q gen 2 firmware
- thinkcentre m70s firmware
- thinkcentre m70s gen 3 firmware
- thinkcentre m70t firmware
- thinkcentre m70t gen 3 firmware
- thinkcentre m75n firmware
- thinkcentre m75q gen 2 firmware
- thinkcentre m75s gen 2 firmware
- thinkcentre m75t gen 2 firmware
- thinkcentre m80q firmware
- thinkcentre m80q gen 3 firmware
- thinkcentre m80s firmware
- thinkcentre m80s gen 3 firmware
- thinkcentre m80t firmware
- thinkcentre m80t gen 3 firmware
- thinkcentre m90a firmware
- thinkcentre m90a gen 2 firmware
- thinkcentre m90a gen 3 firmware
- thinkcentre m90a pro gen 3 firmware
- thinkcentre m90q gen 2 firmware
- thinkcentre m90q gen 3 firmware
- thinkcentre m90q tiny firmware
- thinkcentre m90s firmware
- thinkcentre m90s gen 3 firmware
- thinkcentre m90t firmware
- thinkcentre m90t gen 3 firmware
- thinkcentre m920z all in one firmware
- thinkcentre neo 30a 22 gen 3 firmware
- thinkcentre neo 30a 22 gen 4 firmware
- thinkcentre neo 30a 24 gen 3 firmware
- thinkcentre neo 30a 24 gen 4 firmware
- thinkcentre neo 30a 27 gen 3 firmware
- thinkcentre neo 30a 27 gen 4 firmware
- thinkcentre neo 30a 27 gen 4 firmware o5nkt33a
- thinkcentre neo 50a 24 gen 3 firmware
- thinkcentre neo 50a 24 gen 4 firmware
- thinkcentre neo 50t gen 3 firmware
- thinkcentre neo 70t gen 3 firmware
- thinkedge se30 firmware
- thinkstation p320 workstation firmware
- thinkstation p330 workstation 2nd gen firmware
- thinkstation p330 workstation firmware
- thinkstation p340 tiny workstation firmware
- thinkstation p340 workstation firmware
- thinkstation p348 workstation firmware
- thinkstation p350 tiny workstation firmware
- thinkstation p350 workstation firmware
- thinkstation p358 workstation firmware
- thinkstation p360 tiny workstation firmware
- thinkstation p360 ultra workstation firmware
- thinkstation p360 workstation firmware
- thinkstation p360 workstation firmware
- thinkstation p520 workstation firmware
- thinkstation p520c workstation firmware
- thinkstation p720 workstation firmware
- thinkstation p920 workstation firmware
- v30a 22iml firmware
- v30a 22itl firmware
- v30a 24iml firmware
- v30a 24itl firmware
- v50a 22imb firmware
- v50a 24imb firmware
- v50s 07imb firmware
- v50t 13imb firmware
- v50t 13imh firmware
- v50t 13iob firmware
- v55t gen 2 13acn firmware
- yoga aio 7 27arh7 firmware
- yoga aio 7 27arh6 firmware
References
Additional Info
Authenticated
Unknown
Exploitable
Unknown
Reliability
Unknown
Stability
Unknown
Available Mitigations
Unknown
Shelf Life
Unknown
Userbase/Installbase
Unknown
Patch Effectiveness
Unknown
Rapid7
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: