VYPR
High severity8.2NVD Advisory· Published Jul 30, 2025· Updated Apr 15, 2026

CVE-2025-4423

CVE-2025-4423

Description

The vulnerability was identified in the code developed specifically for Lenovo. Please visit "Lenovo Product Security Advisories and Announcements" webpage for more information about the vulnerability.  https://support.lenovo.com/us/en/product_security/home

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A vulnerability in Lenovo's SetupAutomationSmm SMM module allows an attacker with local high privileges to write arbitrary code, causing memory corruption.

The vulnerability exists in the SetupAutomationSmm component, a System Management Mode (SMM) module developed for Lenovo. It stems from improper restriction of operations within the bounds of a memory buffer (CWE-119), leading to memory corruption [1].

Exploitation requires local access with high privileges (PR:H) and no user interaction (UI:N). The attack surface is limited to attackers who have already gained elevated privileges on the system, as the vulnerability is triggered from within SMM context [1].

Successful exploitation can result in arbitrary code execution in SMM, allowing the attacker to compromise the entire system with high impact on confidentiality, integrity, and availability [1]. The CVSS v3.1 score is 8.2.

Lenovo has released a security advisory (SA-2025007) detailing the vulnerability, and users are advised to apply firmware updates from Lenovo's product security page [1].

References
  1. SA-2025007

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.