First published: Wed May 18 2022(Updated: )
A command injection vulnerability was reported in some Lenovo Personal Cloud Storage devices that could allow an authenticated user to execute operating system commands by sending a crafted packet to the device.
Credit: psirt@lenovo.com
Affected Software | Affected Version | How to fix |
---|---|---|
Lenovo A1 Firmware | <5.3.6.a1 | |
Lenovo A1 Firmware | ||
Lenovo T1 | <5.3.6.t1 | |
Lenovo T1 Firmware | ||
Lenovo X1 Firmware | <5.3.8.x1 | |
Lenovo X1 | ||
Lenovo T2 Firmware | <5.3.8.t2 | |
Lenovo T2 Firmware | ||
Lenovo T2pro Firmware | <5.3.7.t2-pro | |
Lenovo T2pro Firmware |
Update to the Lenovo Personal Cloud Storage device firmware listed in the product table in LEN-73439.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Lenovo Personal Cloud Storage vulnerability is CVE-2021-42852.
CVE-2021-42852 has a severity level of high.
The vulnerability in Lenovo Personal Cloud Storage devices occurs due to a command injection vulnerability.
CVE-2021-42852 can be exploited by an authenticated user.
Yes, a fix is available for CVE-2021-42852. It is recommended to update the affected Lenovo Personal Cloud Storage devices to a version higher than 5.3.8.x1 for X1 Firmware, 5.3.8.t2 for T2 Firmware, and 5.3.7.t2-pro for T2pro Firmware.