Detects many security vulnerabilities in Lenovo server infrastructure
Security researchers have recently discovered the presence of multiple vulnerabilities from simple to dangerous in Lenovo's server infrastructure. These vulnerabilities, if successfully exploited, will seriously damage the security and integrity of Lenovo's systems.
More specifically, researchers from Swascan, an Italian-based cyber security company, have discovered many vulnerabilities exist on Lenovo systems. If an attacker can exploit these vulnerabilities, it will cause many complex problems on the company's system, including arbitrary code execution behavior, and the occurrence of system problems that affect directly. Next to customers.
- Overview of building enterprise security detection and response system
There have been 9 medium to serious vulnerabilities found in Lenovo's system
According to information posted on the Swascan personal blog, there were a total of nine different security holes found in Lenovo's server infrastructure. In particular, there are 2 cases that are classified as particularly serious, which can lead to high security risks, and 7 vulnerabilities are rated at an average level.
The researchers did not specify details of the discovered vulnerabilities. However, they shared some relatively important information regarding the nature of these vulnerabilities through CWE numbers. The recorded vulnerabilities include limited errors that operate incorrectly in the buffer memory limit, NULL Pointer Pereference, incorrect input validation, and neutralizing incorrectly used special elements in the OS command, false authentication errors . These vulnerabilities can basically allow an attacker to execute arbitrary code, read sensitive information and trigger remote system problems.
- Botnet Echobot spreads across a wide range, specifically targeting Oracle and VMware applications
Lenovo patched the flaw
Immediately after discovering the above errors, Swascan researchers promptly informed the security - security department of Lenovo. With the help of the Italian security group, Chinese technology equipment manufacturers have successfully patched the gaps that seriously affect the availability, integrity and security of systems. .
Observers and security experts appreciate the agility and seriousness of Lenovo security team in dealing with vulnerabilities before they can leave the consequences. On the personal blog, the Swascan group made the following comments:
"Lenovo has shown seriousness and absolute focus on our findings. Along with email exchange, analysis, situation assessment and planning to fix problems almost immediately. immediately, it is not surprising that they can handle the vulnerabilities so quickly, it can be said that Lenovo owns the most serious, professional and transparent security team we have ever witnessed and collaborated with. ".
In addition, the researchers did not forget to emphasize the importance of good cooperation between the security research group and the supplier in timely handling of all security incidents.
- Find out about Ghidra - NSA's powerful cybersecurity tool
In April, the Swascan group also pointed out the existence of various vulnerabilities in Microsoft server infrastructure that could allow arbitrary code execution when successfully exploited by exploiters. Previously, researchers also shared their findings regarding serious security vulnerabilities in Adobe IT systems and were highly appreciated.
You should read it
- How to fix BlueKeep security error for Windows 2003, Windows XP, Windows 7, Windows Server 2008
- This is the operating system containing the most holes in a decade
- 5 common errors in managing security vulnerabilities
- 70% of Microsoft security vulnerabilities stem from memory errors
- Release software to check DNS server vulnerabilities
- There are vulnerabilities that allow hackers to bypass the fingerprint security mechanism of Lenovo computers
- Find security holes on every site with Nikto
- Warning of zero-day vulnerabilities in window manager on PC
May be interested
- Detected a security flaw in Lenovo's UEFI firmware, affecting 100 laptop modelsusers who are using affected laptop models should update to the latest firmware to be on the safe side.
- Detects code execution vulnerabilities in WinRAR, noting more than 100 infringement casesa code execution vulnerability in winrar has been exploited more than 100 times separately by hackers in the first week since it was revealed, and it is expected that this number will continue to increase in the future.
- Find security holes on every site with Niktothere are several tools and applications to find security vulnerabilities in web pages, but one of the simplest tools is nikto. this article will show you how to use nikto to check security holes on every site!
- Critical error on Apache Struts2 allows hackers to take over the web servernew researchers have discovered a remote code execution flaw in the apache struts open source web application framework, allowing an attacker to run malicious code on the server.
- 9 misconceptions about security and how to resolvealmost every recent study of security vulnerabilities has come to the same conclusion: people are more risky factors for a business than technology gaps.
- Security vulnerabilities - basic insightssoftware vulnerabilities can be interpreted as a malfunction or weakness in software or operating systems. with the development of new attack technologies, the severity of software vulnerabilities is growing exponentially.
- Download Windows Server 2019 and discover new featureswindows server 2019 preview adds features for super convergence, management, security, containers, and more. because microsoft has moved to gradually upgrade windows server, many of the features available in windows server 2019 have been used in corporate networks and these are its six best features.
- The NSA identifies 4 'critical' security vulnerabilities of cloud systemsthe us national security agency (nsa) has issued a new guide to help organizations and businesses improve the security of data stored on the cloud.
- 5 common errors in managing security vulnerabilitiesin the eyes of some people the issue of managing vulnerabilities is considered one of the intensive security management activities. there are others who think this is just a necessary process that microsoft has to make
- How to scan websites for potential security vulnerabilities with Vega on Kali Linuxresisting a hacker attack is one of the most important responsibilities a system administrator must perform. therefore, it is important for a system administrator to take proactive measures to find and fix vulnerabilities in their websites.