Attacker Value
Unknown
0
CVE-2022-48181
0
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2022-48181
(Last updated October 08, 2023) ▾
MITRE ATT&CK
Log in to add MITRE ATT&CK tag
Add MITRE ATT&CK tactics and techniques that apply to this CVE.
MITRE ATT&CK
Select the MITRE ATT&CK Tactics that apply to this CVE
Collection
Select any Techniques used:
Command and Control
Select any Techniques used:
Credential Access
Select any Techniques used:
Defense Evasion
Select any Techniques used:
Discovery
Select any Techniques used:
Execution
Select any Techniques used:
Exfiltration
Select any Techniques used:
Impact
Select any Techniques used:
Initial Access
Select any Techniques used:
Lateral Movement
Select any Techniques used:
Persistence
Select any Techniques used:
Privilege Escalation
Select any Techniques used:
Topic Tags
Select the tags that apply to this CVE (Assessment added tags are disabled and cannot be removed)
What makes this of high-value to an attacker?
What makes this of low-value to an attacker?
Description
An ErrorMessage driver stack-based buffer overflow vulnerability in BIOS of some ThinkPad models could allow an attacker with local access to elevate their privileges and execute arbitrary code.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
Data provided by the National Vulnerability Database (NVD)
Base Score:
7.8 High
Impact Score:
5.9
Exploitability Score:
1.8
Attack Vector (AV):
Local
Attack Complexity (AC):
Low
Privileges Required (PR):
Low
User Interaction (UI):
None
Scope (S):
Unchanged
Confidentiality (C):
High
Integrity (I):
High
Availability (A):
High
General Information
Offensive Application
Unknown
Utility Class
Unknown
Ports
Unknown
OS
Unknown
Vulnerable Versions
ThinkStation BIOS various
Prerequisites
Unknown
Discovered By
Unknown
PoC Author
Unknown
Metasploit Module
Unknown
Reporter
Unknown
Vendors
Products
- ideacentre 3 07ach7 firmware
- ideacentre 3 07iab7 firmware
- ideacentre 3 07ada05 firmware
- ideacentre 3 07imb05 firmware
- ideacentre 5 14iab7 firmware
- ideacentre 5 14acn6 firmware
- ideacentre 5 14are05 firmware
- ideacentre 5 14imb05 firmware
- ideacentre 5 14iob6 firmware
- ideacentre 510s 07icb firmware
- ideacentre 510s 07ick firmware
- ideacentre 720 18apr firmware
- ideacentre aio 3 21itl7 firmware
- ideacentre aio 3 22iap7 firmware
- ideacentre aio 3 24iap7 firmware
- ideacentre aio 3 27iap7 firmware
- ideacentre aio 3 22imb05 firmware
- ideacentre aio 3 22itl6 firmware
- ideacentre aio 3 24alc6 firmware
- ideacentre aio 3 24imb05 firmware
- ideacentre aio 3 24itl6 firmware
- ideacentre aio 3 27alc6 firmware
- ideacentre aio 3 27imb05 firmware
- ideacentre aio 3 27itl6 firmware
- ideacentre aio 5 24iah7 firmware
- ideacentre aio 5 27iah7 firmware
- ideacentre c5 14imb05 firmware
- ideacentre creator 5 14iob6 firmware
- ideacentre g5 14amr05 firmware
- ideacentre g5 14imb05 firmware
- ideacentre gaming 5 17acn7 firmware
- ideacentre gaming 5 17iab7 firmware
- ideacentre gaming 5 14acn6 firmware
- ideacentre gaming 5 14iob6 firmware
- ideacentre mini 5 01iaq7 firmware
- ideacentre mini 5 01imh05 firmware
- legion c530 19icb firmware
- legion r5 28imb05 firmware
- legion t5 26amr5 firmware
- legion t5 26iob6 firmware
- legion t5 28icb05 firmware
- legion t5 28imb05 firmware
- legion t530 28icb firmware
- legion t7 34iaz7 firmware
- legion t7 34imz5 firmware
- lenovo legion t5 26iab7 firmware
- thinkcentre m600 firmware
- thinkcentre m60e tiny firmware
- thinkcentre m625q firmware
- thinkcentre m70c firmware
- thinkcentre m70q firmware
- thinkcentre m70q gen 2 firmware
- thinkcentre m70q gen 3 firmware
- thinkcentre m70s firmware
- thinkcentre m70s gen 3 firmware
- thinkcentre m70t firmware
- thinkcentre m70t gen 3 firmware
- thinkcentre m720e firmware
- thinkcentre m720q firmware
- thinkcentre m720s firmware
- thinkcentre m720t firmware
- thinkcentre m725s firmware
- thinkcentre m75n firmware
- thinkcentre m75s gen 2 firmware
- thinkcentre m75s 1 firmware
- thinkcentre m75t gen 2 firmware
- thinkcentre m80q firmware
- thinkcentre m80q gen 3 firmware
- thinkcentre m80s firmware
- thinkcentre m80s gen 3 firmware
- thinkcentre m80t firmware
- thinkcentre m80t gen 3 firmware
- thinkcentre m90a firmware
- thinkcentre m90a gen 2 firmware
- thinkcentre m90a gen 3 firmware
- thinkcentre m90a pro gen 3 firmware
- thinkcentre m90q gen 2 firmware
- thinkcentre m90q gen 3 firmware
- thinkcentre m90q tiny firmware
- thinkcentre m90s firmware
- thinkcentre m90s gen 3 firmware
- thinkcentre m90t firmware
- thinkcentre m90t gen 3 firmware
- thinkcentre m920q firmware
- thinkcentre m920s firmware
- thinkcentre m920t firmware
- thinkcentre m920x firmware
- thinkcentre m920z firmware
- thinkcentre neo 30a 22 gen 3 firmware
- thinkcentre neo 30a 24 gen 3 firmware
- thinkcentre neo 30a 27 gen 3 firmware
- thinkcentre neo 50s gen 3 firmware
- thinkcentre neo 50t gen 3 firmware
- thinkcentre neo 70t gen 3 firmware
- thinkcentre t540 15ama g firmware
- thinkstation p320 firmware
- thinkstation p330 firmware
- thinkstation p330 gen 2 firmware
- thinkstation p330 tiny firmware
- thinkstation p340 firmware
- thinkstation p340 tiny firmware
- thinkstation p350 firmware
- thinkstation p350 tiny firmware
- thinkstation p360 firmware
- thinkstation p360 tiny firmware
- v30a 22itl firmware
- v30a 24itl firmware
- v35s 07ada firmware
- v50s 07imb firmware
- v50t 13imb firmware
- v50t 13iob g2 firmware
- v530s 07icb firmware
- v530s 07icr firmware
- v55t gen 2 13acn firmware
References
Additional Info
Authenticated
Unknown
Exploitable
Unknown
Reliability
Unknown
Stability
Unknown
Available Mitigations
Unknown
Shelf Life
Unknown
Userbase/Installbase
Unknown
Patch Effectiveness
Unknown
Rapid7
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: