There are vulnerabilities that allow hackers to bypass the fingerprint security mechanism of Lenovo computers
The Fingerprint Manager Pro program of Microsoft Windows 7, 8 and 8.1 allows users to store data, log in personal accounts on websites, log in to a lenovo computer via fingerprint There are many vulnerabilities that may allow hackers to access user sensitive data.
All sensitive data including Windows login information, user fingerprint data stored when using this software are encrypted but the encryption algorithm is not strong enough.
Lenovo said that Fingerprint Manager Pro 8.01.86 version contains a default password that allows the software to not need administrative rights of the computer and can still access all user accounts (CVE-2017 vulnerability code -3762).
The vulnerability affects Lenovo ThinkPad, ThinkCentry and ThinkStatins laptops running Windows 7, 8 and 8.1. Below is a detailed list of devices affected by this vulnerability:
• ThinkPad L560
• ThinkPad P40 Yoga, P50s
• ThinkPad T440, T440p, T440s, T450, T450s, T460, T540p, T550, T560
• ThinkPad W540, W541, W550s
• ThinkPad X1 Carbon (Type 20A7, 20A8), X1 Carbon (Type 20BS, 20BT)
• ThinkPad X240, X240s, X250, X260
• ThinkPad Yoga 14 (20FY), Yoga 460
• ThinkCentre M73, M73z, M78, M79, M83, M93, M93p, M93z
• ThinkStation E32, P300, P500, P700, P900
To fix this vulnerability, computer manufacturers recommend that ThinkPad customers need to update Fingerprint Manager Pro to version 8.01.87 or higher. Windows 10 users will not be affected by this vulnerability because Microsoft has added the fingerprint reader feature on Windows 10 operating system.
See more:
- Trick to use Samsung Galaxy S8 / S8 Plus fingerprint sensor
- Critical vulnerabilities discovered in Framework Electron, Skype, Slack, Twitch and a series of affected apps
- The Ministry of Public Security warned users to warn of bank account theft when withdrawing money at ATMs
- Firefox Quantum 58 has an official version for Windows, enhanced security and has many new features
You should read it
- Can the phone be unlocked by the fingerprint of the dead?
- HP launched a new mouse, providing a fingerprint security solution for the PC
- New security vulnerabilities on iOS 12.1 allow access to contacts and phone calls
- How does the in-display fingerprint sensor work?
- Protect iPhone, iPad before iCloud security hole
- Detect 2 serious security holes in the Zoom application
- How to safely set up fingerprint security on HP laptops
- Fingerprint recognition will land on Windows Phone 8.1
May be interested
- Foreshadow - the fifth most serious security hole in the CPU in 2018this vulnerability could bypass intel sgx security measures. what a tiring year for microprocessors, especially intel.
- The new vulnerability on Intel allows hackers to take control of your computer within 30 secondswhile intel's meltdown and specter vulnerabilities have not been completely overcome, the world faces a new security vulnerability that allows hackers to take complete control of the user's device and attack time within 30 seconds.
- A serious security error appeared on Android that allowed hackers to control smartphones through a photoa serious security hole on the android operating system has just been discovered, which can help hackers run malicious code and control smartphones remotely by displaying a png image file (portable network graphic).
- The new zero-day vulnerability on Windows 10 helps hackers take control of the computerthis is a serious security vulnerability that could allow hackers to attack and gain control of computer devices.
- How to set up fingerprint for laptop win 10, absolute securitycompared to character passwords, setting up fingerprint security is much more useful and secure, and harder to hack. most high-end laptop models today are integrated with fingerprint login feature. here is how to set up fingerprint for windows 10 laptop.
- Many serious vulnerabilities have been discovered that allow attackers to take full control of the 4G routerin the past few months, security experts around the world have found that many vulnerabilities exist in 4g routers.
- Web5: SQL injection - Some techniques to bypass the filtering mechanismin this article, tipsmake.com will learn with you about ways to bypass the filtering mechanism in sql injection.
- How is the world's largest bank secure?when global financial activities are increasingly digitized to bring convenience to users as well as for banks. but with that is the concern about card safety, the status of hackers stealing login account information, payment card numbers ... makes banks re-enter the security technology race.
- HP launched a pair of laptops that support fingerprint securitythe hp manufacturer has just announced two new laptops, the hp 248 and hp 350, with the highlights of supporting fingerprint unlocking technology, but sold at a relatively soft price.
- Chinese hackers use fingerprints on glass to crack smartphonestencent's x-lab hacker group demonstrated the technique of unlocking smartphone fingerprint sensors in just 20 minutes using a new application they developed and fingerprinting on glass.