Description
During an internal security assessment, a potential vulnerability was discovered in Lenovo Diagnostics and the HardwareScanAddin used in Lenovo Vantage that, during installation or when using hardware scan, could allow a local authenticated user to perform an arbitrary file write with elevated privileges.
Published: 2026-04-15
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Local Privilege Escalation via Arbitrary File Write
Action: Immediate Patch
AI Analysis

Impact

A vulnerability in Lenovo Diagnostics and the HardwareScanAddin used by Lenovo Vantage permits a local authenticated user to perform an arbitrary file write with elevated privileges during installation or hardware scan operations. This flaw enables modification of system files, potentially replacing binaries, altering configuration files, or injecting malicious code, thereby allowing the attacker to elevate privileges. The weakness is an instance of improper path validation, as classified by CWE‑59.

Affected Systems

The affected products are Lenovo Diagnostics and Lenovo Vantage, including the HardwareScanAddin component. Versions prior to Diagnostics 5.26.0 and to Vantage and Commercial Vantage HardwareScanAddin 4.7.1.4 are susceptible. All newer builds that incorporate the listed updates are not vulnerable.

Risk and Exploitability

The CVSS base score is 6.9, indicating medium severity. No EPSS score is available, so the likelihood of exploitation cannot be quantified, and the vulnerability is not listed in the CISA KEV catalog. It requires a local authenticated user with installation or scanning privileges, so the attack vector is inferred to be local. Given the potential for privilege escalation, the overall risk remains moderate to high depending on the environment.

Generated by OpenCVE AI on April 15, 2026 at 13:21 UTC.

Remediation

Vendor Solution

Update Lenovo Diagnostics to version 5.26.0 or later.


OpenCVE Recommended Actions

  • Apply the vendor patch by updating Lenovo Diagnostics to version 5.26.0 or later.
  • Upgrade Lenovo Vantage and Commercial Vantage HardwareScanAddin to version 4.7.1.4 or later; the add‑in is updated automatically when Vantage is updated.
  • Limit installation and use of Lenovo Diagnostics and Vantage to trusted users only, ensuring that only authorized personnel can install or run the software.

Generated by OpenCVE AI on April 15, 2026 at 13:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 15 Apr 2026 13:45:00 +0000

Type Values Removed Values Added
Title Local Privilege Escalation via Arbitrary File Write in Lenovo Diagnostics and Vantage

Wed, 15 Apr 2026 12:45:00 +0000

Type Values Removed Values Added
Description During an internal security assessment, a potential vulnerability was discovered in Lenovo Diagnostics and the HardwareScanAddin used in Lenovo Vantage that, during installation or when using hardware scan, could allow a local authenticated user to perform an arbitrary file write with elevated privileges.
First Time appeared Lenovo
Lenovo diagnostics
Lenovo vantage
Weaknesses CWE-59
CPEs cpe:2.3:a:lenovo:diagnostics:*:*:*:*:*:*:*:*
cpe:2.3:a:lenovo:vantage:*:*:*:*:*:*:*:*
Vendors & Products Lenovo
Lenovo diagnostics
Lenovo vantage
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Lenovo Diagnostics Vantage
cve-icon MITRE

Status: PUBLISHED

Assigner: lenovo

Published:

Updated: 2026-04-15T13:48:06.089Z

Reserved: 2026-01-09T19:19:57.946Z

Link: CVE-2026-0827

cve-icon Vulnrichment

Updated: 2026-04-15T13:46:37.238Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-15T13:16:23.097

Modified: 2026-04-17T15:09:46.880

Link: CVE-2026-0827

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T13:38:28Z

Weaknesses