6.7
MEDIUM
CVE-2023-4028
Lenovo SystemUserMasterHddPwdDxe Driver Buffer Overflow
Description

A buffer overflow has been identified in the SystemUserMasterHddPwdDxe driver in some Lenovo Notebook products which may allow an attacker with local access and elevated privileges to execute arbitrary code.

INFO

Published Date :

Aug. 17, 2023, 5:15 p.m.

Last Modified :

Nov. 21, 2024, 8:34 a.m.

Remotely Exploitable :

No

Impact Score :

5.9

Exploitability Score :

0.8
Affected Products

The following products are affected by CVE-2023-4028 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Lenovo 13w_yoga_firmware
2 Lenovo flex_5-14alc05_firmware
3 Lenovo flex_5-14are05_firmware
4 Lenovo flex_5-14iil05_firmware
5 Lenovo flex_5-14itl05_firmware
6 Lenovo flex_5-15alc05_firmware
7 Lenovo flex_5-15iil05_firmware
8 Lenovo flex_5-15itl05_firmware
9 Lenovo ideapad_1-11ada05_firmware
10 Lenovo ideapad_1-11igl05_firmware
11 Lenovo ideapad_1-14ada05_firmware
12 Lenovo ideapad_1-14igl05_firmware
13 Lenovo ideapad_flex_5_14alc7_firmware
14 Lenovo ideapad_flex_5_16alc7_firmware
15 Lenovo thinkbook_13s_g3_acn_firmware
16 Lenovo thinkbook_13s_g2_are_firmware
17 Lenovo thinkbook_13s_g2_itl_firmware
18 Lenovo thinkbook_14s_g2_itl_firmware
19 Lenovo yoga_9-15imh5_firmware
20 Lenovo 13w_yoga_gen_2_firmware
21 Lenovo ideapad_flex_5_14abr8_firmware
22 Lenovo ideapad_flex_5_14iau7_firmware
23 Lenovo ideapad_flex_5_14iru8_firmware
24 Lenovo ideapad_flex_5_16abr8_firmware
25 Lenovo ideapad_flex_5_16iau7_firmware
26 Lenovo ideapad_flex_5_16iru8_firmware
27 Lenovo flex_7_14iru8_firmware
28 Lenovo thinkbook_13s_g4_iap_firmware
29 Lenovo thinkbook_13x_g2_iap_firmware
30 Lenovo ideapad_1-11igl05
31 Lenovo ideapad_1-14igl05
32 Lenovo ideapad_1-11ada05
33 Lenovo ideapad_1-14ada05
34 Lenovo 13w_yoga
35 Lenovo flex_5-14alc05
36 Lenovo flex_5-14are05
37 Lenovo flex_5-14iil05
38 Lenovo flex_5-14itl05
39 Lenovo flex_5-15alc05
40 Lenovo flex_5-15iil05
41 Lenovo flex_5-15itl05
42 Lenovo ideapad_flex_5_14alc7
43 Lenovo ideapad_flex_5_16alc7
44 Lenovo thinkbook_13s_g3_acn
45 Lenovo thinkbook_13s_g2_are
46 Lenovo thinkbook_13s_g2_itl
47 Lenovo thinkbook_14s_g2_itl
48 Lenovo yoga_9-15imh5
49 Lenovo 13w_yoga_gen_2
50 Lenovo ideapad_flex_5_14abr8
51 Lenovo ideapad_flex_5_14iau7
52 Lenovo ideapad_flex_5_14iru8
53 Lenovo ideapad_flex_5_16abr8
54 Lenovo ideapad_flex_5_16iau7
55 Lenovo ideapad_flex_5_16iru8
56 Lenovo flex_7_14iru8
57 Lenovo thinkbook_13s_g4_iap
58 Lenovo thinkbook_13x_g2_iap
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2023-4028.

URL Resource
https://support.lenovo.com/us/en/product_security/LEN-134879 Vendor Advisory
https://support.lenovo.com/us/en/product_security/LEN-134879 Vendor Advisory

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2023-4028 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2023-4028 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference https://support.lenovo.com/us/en/product_security/LEN-134879
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • Initial Analysis by [email protected]

    Aug. 24, 2023

    Action Type Old Value New Value
    Added CVSS V3.1 NIST AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
    Changed Reference Type https://support.lenovo.com/us/en/product_security/LEN-134879 No Types Assigned https://support.lenovo.com/us/en/product_security/LEN-134879 Vendor Advisory
    Added CWE NIST CWE-120
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:13w_yoga_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jacn38ww OR cpe:2.3:h:lenovo:13w_yoga:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:13w_yoga_gen_2_firmware:*:*:*:*:*:*:*:* versions up to (excluding) kbcn20ww OR cpe:2.3:h:lenovo:13w_yoga_gen_2:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:ideapad_1-11ada05_firmware:*:*:*:*:*:*:*:* versions up to (excluding) fqcn29ww OR cpe:2.3:h:lenovo:ideapad_1-11ada05:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:ideapad_1-11igl05_firmware:*:*:*:*:*:*:*:* versions up to (excluding) dwcn28ww OR cpe:2.3:h:lenovo:ideapad_1-11igl05:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:ideapad_1-14ada05_firmware:*:*:*:*:*:*:*:* versions up to (excluding) fqcn29ww OR cpe:2.3:h:lenovo:ideapad_1-14ada05:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:ideapad_1-14igl05_firmware:*:*:*:*:*:*:*:* versions up to (excluding) dwcn28ww OR cpe:2.3:h:lenovo:ideapad_1-14igl05:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:flex_5-14alc05_firmware:*:*:*:*:*:*:*:* versions up to (excluding) gjcn32ww OR cpe:2.3:h:lenovo:flex_5-14alc05:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:flex_5-14are05_firmware:*:*:*:*:*:*:*:* versions up to (excluding) eecn43ww OR cpe:2.3:h:lenovo:flex_5-14are05:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:flex_5-14iil05_firmware:*:*:*:*:*:*:*:* versions up to (excluding) eccn45ww OR cpe:2.3:h:lenovo:flex_5-14iil05:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:flex_5-14itl05_firmware:*:*:*:*:*:*:*:* versions up to (excluding) fxcn44ww OR cpe:2.3:h:lenovo:flex_5-14itl05:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:flex_5-15alc05_firmware:*:*:*:*:*:*:*:* versions up to (excluding) gjcn32ww OR cpe:2.3:h:lenovo:flex_5-15alc05:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:flex_5-15iil05_firmware:*:*:*:*:*:*:*:* versions up to (excluding) eccn45ww OR cpe:2.3:h:lenovo:flex_5-15iil05:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:flex_5-15itl05_firmware:*:*:*:*:*:*:*:* versions up to (excluding) fxcn44ww OR cpe:2.3:h:lenovo:flex_5-15itl05:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:ideapad_flex_5_14abr8_firmware:*:*:*:*:*:*:*:* versions up to (excluding) l7cn17ww OR cpe:2.3:h:lenovo:ideapad_flex_5_14abr8:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:ideapad_flex_5_14alc7_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jccn35ww OR cpe:2.3:h:lenovo:ideapad_flex_5_14alc7:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:ideapad_flex_5_14iau7_firmware:*:*:*:*:*:*:*:* versions up to (excluding) j7cn44ww OR cpe:2.3:h:lenovo:ideapad_flex_5_14iau7:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:ideapad_flex_5_14iru8_firmware:*:*:*:*:*:*:*:* versions up to (excluding) l6cn20ww OR cpe:2.3:h:lenovo:ideapad_flex_5_14iru8:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:ideapad_flex_5_16abr8_firmware:*:*:*:*:*:*:*:* versions up to (excluding) l7cn17ww OR cpe:2.3:h:lenovo:ideapad_flex_5_16abr8:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:ideapad_flex_5_16alc7_firmware:*:*:*:*:*:*:*:* versions up to (excluding) jccn35ww OR cpe:2.3:h:lenovo:ideapad_flex_5_16alc7:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:ideapad_flex_5_16iau7_firmware:*:*:*:*:*:*:*:* versions up to (excluding) j7cn44ww OR cpe:2.3:h:lenovo:ideapad_flex_5_16iau7:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:ideapad_flex_5_16iru8_firmware:*:*:*:*:*:*:*:* versions up to (excluding) l6cn20ww OR cpe:2.3:h:lenovo:ideapad_flex_5_16iru8:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:flex_7_14iru8_firmware:*:*:*:*:*:*:*:* versions up to (excluding) l6cn20ww OR cpe:2.3:h:lenovo:flex_7_14iru8:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinkbook_13s_g2_are_firmware:*:*:*:*:*:*:*:* versions up to (excluding) fvcn28ww OR cpe:2.3:h:lenovo:thinkbook_13s_g2_are:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinkbook_13s_g2_itl_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f9cn57ww OR cpe:2.3:h:lenovo:thinkbook_13s_g2_itl:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinkbook_13s_g3_acn_firmware:*:*:*:*:*:*:*:* versions up to (excluding) gmcn35ww OR cpe:2.3:h:lenovo:thinkbook_13s_g3_acn:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinkbook_13s_g4_iap_firmware:*:*:*:*:*:*:*:* versions up to (excluding) hwcn49ww OR cpe:2.3:h:lenovo:thinkbook_13s_g4_iap:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinkbook_13x_g2_iap_firmware:*:*:*:*:*:*:*:* versions up to (excluding) hxcn54ww OR cpe:2.3:h:lenovo:thinkbook_13x_g2_iap:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:thinkbook_14s_g2_itl_firmware:*:*:*:*:*:*:*:* versions up to (excluding) f9cn57ww OR cpe:2.3:h:lenovo:thinkbook_14s_g2_itl:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:lenovo:yoga_9-15imh5_firmware:*:*:*:*:*:*:*:* versions up to (excluding) epcn32ww OR cpe:2.3:h:lenovo:yoga_9-15imh5:-:*:*:*:*:*:*:*
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2023-4028 is associated with the following CWEs:

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

0.04 }} -0.02%

score

0.05692

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability