First published: Fri Feb 16 2024(Updated: )
ThinkSystem SR670V2 servers manufactured from approximately June 2021 to July 2023 were left in Manufacturing Mode which could allow an attacker with privileged logical access to the host or physical access to server internals to modify or disable Intel Boot Guard firmware integrity, SPS security, and other SPS configuration setting. The server’s NIST SP 800-193-compliant Platform Firmware Resiliency (PFR) security subsystem significantly mitigates this issue.
Credit: psirt@lenovo.com
Affected Software | Affected Version | How to fix |
---|---|---|
Lenovo ThinkSystem SR670 V2 | >=June 2021<July 2023 | |
All of | ||
Lenovo ThinkSystem SR670 V2 | <u8e126i-2.20 | |
Lenovo ThinkSystem SR670 |
Update system UEFI firmware to version u8e126i-2.20 (or newer) indicated for your model in the Product Impact section of our advisory: https://support.lenovo.com/us/en/product_security/LEN-150020
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-23591 is considered a critical vulnerability due to the potential severe impact on system integrity.
To mitigate CVE-2024-23591, update the firmware of the Lenovo ThinkSystem SR670V2 to the latest version beyond u8e126i-2.20.
CVE-2024-23591 affects Lenovo ThinkSystem SR670V2 servers manufactured between June 2021 and July 2023.
CVE-2024-23591 allows an attacker with privileged access to modify or disable critical firmware integrity measures.
Yes, CVE-2024-23591 can be exploited with either privileged logical access or physical access to the server internals.