Attacker Value
Unknown
0
CVE-2019-6171
0
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2019-6171
(Last updated November 27, 2024) ▾
MITRE ATT&CK
Log in to add MITRE ATT&CK tag
Add MITRE ATT&CK tactics and techniques that apply to this CVE.
MITRE ATT&CK
Select the MITRE ATT&CK Tactics that apply to this CVE
Collection
Select any Techniques used:
Command and Control
Select any Techniques used:
Credential Access
Select any Techniques used:
Defense Evasion
Select any Techniques used:
Discovery
Select any Techniques used:
Execution
Select any Techniques used:
Exfiltration
Select any Techniques used:
Impact
Select any Techniques used:
Initial Access
Select any Techniques used:
Lateral Movement
Select any Techniques used:
Persistence
Select any Techniques used:
Privilege Escalation
Select any Techniques used:
Topic Tags
Select the tags that apply to this CVE (Assessment added tags are disabled and cannot be removed)
What makes this of high-value to an attacker?
What makes this of low-value to an attacker?
Description
A vulnerability was reported in various BIOS versions of older ThinkPad systems that could allow a user with administrative privileges or physical access the ability to update the Embedded Controller with unsigned firmware.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
Data provided by the National Vulnerability Database (NVD)
Base Score:
6.8 Medium
Impact Score:
5.9
Exploitability Score:
0.9
Attack Vector (AV):
Physical
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope (S):
Unchanged
Confidentiality (C):
High
Integrity (I):
High
Availability (A):
High
General Information
Offensive Application
Unknown
Utility Class
Unknown
Ports
Unknown
OS
Unknown
Vulnerable Versions
BIOS various
Prerequisites
Unknown
Discovered By
Unknown
PoC Author
Unknown
Metasploit Module
Unknown
Reporter
Unknown
Vendors
Products
- 20a7 firmware -,
- 20a8 firmware -,
- 20a9 firmware -,
- 20aa firmware -,
- 20ab firmware -,
- 20ac firmware -,
- 20aj firmware -,
- 20ak firmware -,
- 20al firmware -,
- 20am firmware -,
- 20an firmware -,
- 20aq firmware -,
- 20ar firmware -,
- 20aw firmware -,
- 20b0 firmware -,
- 20b3 firmware -,
- 20b6 firmware -,
- 20b7 firmware -,
- 20be firmware -,
- 20bf firmware -,
- 20bg firmware -,
- 20bl firmware -,
- 20bm firmware -,
- 20bu firmware -,
- 20bv firmware -,
- 20bw firmware -,
- 20bx firmware -,
- 20d9 firmware -,
- 20da firmware -,
- 20dc firmware -,
- 20dd firmware -,
- 20de firmware -,
- 20df firmware -,
- 20dg firmware -,
- 20dh firmware -,
- 20dj firmware -,
- 20dq firmware -,
- 20dr firmware -,
- 20ds firmware -,
- 20dt firmware -,
- 20e0 firmware -,
- 20ef firmware -,
- 20eg firmware -,
- 20et firmware -,
- 20eu firmware -,
- 20ev firmware -,
- 20ew firmware -,
- 20ex firmware -,
- 20ey firmware -,
- 20f1 firmware -,
- 20f2 firmware -,
- 20f5 firmware -,
- 20f6 firmware -,
- 20fm firmware -,
- 20fn firmware -,
- 20fu firmware -,
- 20fv firmware -,
- 20fw firmware -,
- 20fx firmware -,
- 20g4 firmware -,
- 20g5 firmware -,
- 20g8 firmware -,
- 20g9 firmware -,
- 20ga firmware -,
- 20gb firmware -,
- 20h1 firmware -,
- 20h2 firmware -,
- 20h4 firmware -,
- 20h5 firmware -,
- 20h6 firmware -,
- 20h8 firmware -,
- 20hm firmware -,
- 20hn firmware -,
- 20hs firmware -,
- 20ht firmware -,
- 20hu firmware -,
- 20hv firmware -,
- 20j1 firmware -,
- 20j2 firmware -,
- 20j4 firmware -,
- 20j5 firmware -,
- 20j6 firmware -,
- 20j7 firmware -,
- 20ja firmware -,
- 20jh firmware -,
- 20jj firmware -,
- 20jq firmware -,
- 20jr firmware -,
- 20ju firmware -,
- 20jv firmware -,
- 20k5 firmware -,
- 20k6 firmware -,
- 20kc firmware -,
- 20kd firmware -,
- 20kl firmware -,
- 20km firmware -,
- 20kn firmware -,
- 20kq firmware -,
- 20ks firmware -,
- 20kt firmware -,
- 20ku firmware -,
- 20kv firmware -,
- 20l2 firmware -,
- 20lh firmware -,
- 20lj firmware -,
- 20lm firmware -,
- 20ln firmware -,
- 20lq firmware -,
- 20lr firmware -,
- 20ls firmware -,
- 20lt firmware -,
- 20lx firmware -,
- 20m5 firmware -,
- 20m6 firmware -,
- 20m7 firmware -,
- 20m8 firmware -,
- 20mu firmware -,
- 20mv firmware -,
- 20mw firmware -,
- 20mx firmware -,
- 20n8 firmware -,
- 20n9 firmware -,
- 20ng firmware -,
- 20nn firmware -,
- 20nq firmware -,
- 20nr firmware -,
- 20ns firmware -,
- 20nt firmware -,
- 20nu firmware -,
- 230x firmware -,
- 232x firmware -,
- 233x firmware -,
- 234x firmware -,
- 235x firmware -,
- 239x firmware -,
- 242x firmware -,
- 243x firmware -,
- 244x firmware -,
- 246x firmware -,
- 247x firmware -,
- 248x firmware -,
- 30eh firmware -,
- 336x firmware -,
- 337x firmware -,
- 343x firmware -,
- 344x firmware -,
- 34xx firmware -,
- 3xxx firmware -
References
Miscellaneous
Additional Info
Authenticated
Unknown
Exploitable
Unknown
Reliability
Unknown
Stability
Unknown
Available Mitigations
Unknown
Shelf Life
Unknown
Userbase/Installbase
Unknown
Patch Effectiveness
Unknown
Rapid7
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: