Lenovo has released patches to fix critical Wi-Fi vulnerabilities

Share if you likedShare on Facebook0Share on Google+0Tweet about this on TwitterShare on LinkedIn0

Lenovo informed customers on Friday that two critical Broadcom vulnerabilities (Identified as CVE-2017-11120 and CVE-2017-11121) affect 25 models of its common ThinkPad brand.

The two vulnerabilities were discovered by security researchers from Google Project Zero and first revealed in September 2017, they were only reported to affect specific Broadcom chipsets applied in Apple iPhones, Apple TV and Android devices.

The researcher of Google Project Zero demonstrated that an attacker inside Wi-Fi range could exploit CVE-2017-11120, an out-of-bounds write issue, to perform arbitrary code execution on an affected device.

According to the researcher:
“Upon successful execution of the exploit, a backdoor is inserted into the firmware, allowing remote read/write commands to be issued to the firmware via crafted action frames (thus allowing easy remote control over the Wi-Fi chip),”

The CVE-2017-11121 bug, which is a buffer overflow vulnerability caused by improper validation of Wi-Fi signals. This could lead to remote code execution as well.

Lenovo said last week:
“Broadcom has issued an advisory for certain Broadcom WiFi controllers used by many computer and device makers, which contain buffer overflow vulnerabilities on the adapter (not the system CPU)”

ThinkPad clients are recommended by Lenovo to update their Wi-Fi driver to the latest version.

Source: support.lenovo.com

Share if you likedShare on Facebook0Share on Google+0Tweet about this on TwitterShare on LinkedIn0
The following two tabs change content below.

Eslam Medhat

is a professional pen-tester with over 9 years of IT experience bringing a strong background in programming languages and application security, ranging from network and system administration to exploit research and development. He reported various vulnerabilities for high profile companies and vendors and was successfully acknowledged by them.

Eslam Medhat

is a professional pen-tester with over 9 years of IT experience bringing a strong background in programming languages and application security, ranging from network and system administration to exploit research and development. He reported various vulnerabilities for high profile companies and vendors and was successfully acknowledged by them.

Leave a Reply