Impact
The reported vulnerability in Lenovo PC Manager allows a local authenticated user to terminate privileged processes, effectively causing a privilege escalation. The weakness is classified as CWE-269, indicating an authorization bypass or escalation of privilege. By terminating high‑privilege processes, an attacker could disrupt critical services, degrade system availability, or prepare for further escalation steps. No remote attack vector or exploit code is indicated; the impact is limited to a local context where the user has valid credentials to access the PC Manager application.
Affected Systems
Lenovo:PC Manager is affected. The specific affected software versions are not listed in the CVE data; however, the vulnerability applies to the product as a whole until the vendor specifies versions. Administrators should assume all current installers of Lenovo PC Manager are potentially vulnerable until a patch is applied.
Risk and Exploitability
The CVSS score of 6.8 indicates a moderate severity, while the EPSS score of less than 1% suggests a low likelihood of exploitation in the wild. The vulnerability is not listed in CISA’s KEV catalog, indicating it is not a known exploited vulnerability at the time of reporting. The attack requires local, authenticated access to Lenovo PC Manager, so physical or direct login access is necessary. Once executed, the attacker can terminate privileged processes, which may cause denial of service or create opportunities for further compromise. The practical risk is moderate but should be mitigated promptly.
OpenCVE Enrichment