Lenovo Fingerprint Manager up to 8.01.86 Data Store hard-coded credentials
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 6.5 | $0-$5k | 0.00 |
Summary
A vulnerability classified as critical was found in Lenovo Fingerprint Manager up to 8.01.86. Affected by this issue is some unknown functionality of the component Data Store. The manipulation results in hard-coded credentials. This vulnerability is identified as CVE-2017-3762. The attack is only possible with local access. There is not any exploit available.
Details
A vulnerability, which was classified as critical, was found in Lenovo Fingerprint Manager up to 8.01.86. Affected is an unknown function of the component Data Store. The manipulation with an unknown input leads to a hard-coded credentials vulnerability. CWE is classifying the issue as CWE-798. The product contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. This is going to have an impact on confidentiality, integrity, and availability. CVE summarizes:
Sensitive data stored by Lenovo Fingerprint Manager Pro, version 8.01.86 and earlier, including users' Windows logon credentials and fingerprint data, is encrypted using a weak algorithm, contains a hard-coded password, and is accessible to all users with local non-administrative access to the system in which it is installed.
The bug was discovered 01/25/2018. The weakness was released 01/26/2018 (Website). The advisory is shared for download at support.lenovo.com. This vulnerability is traded as CVE-2017-3762 since 12/16/2016. The exploitability is told to be easy. The attack needs to be approached locally. The exploitation doesn't require any form of authentication. There are neither technical details nor an exploit publicly available. The MITRE ATT&CK project declares the attack technique as T1110.001.
The commercial vulnerability scanner Qualys is able to test this issue with plugin 370746 (Lenovo Fingerprint Manager Pro Insecure Credential Storage Vulnerability).
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
The vulnerability is also documented in the vulnerability database at SecurityFocus (BID 102837†). Once again VulDB remains the best source for vulnerability data.
Product
Vendor
Name
Version
- 8.01.0
- 8.01.1
- 8.01.2
- 8.01.3
- 8.01.4
- 8.01.5
- 8.01.6
- 8.01.7
- 8.01.8
- 8.01.9
- 8.01.10
- 8.01.11
- 8.01.12
- 8.01.13
- 8.01.14
- 8.01.15
- 8.01.16
- 8.01.17
- 8.01.18
- 8.01.19
- 8.01.20
- 8.01.21
- 8.01.22
- 8.01.23
- 8.01.24
- 8.01.25
- 8.01.26
- 8.01.27
- 8.01.28
- 8.01.29
- 8.01.30
- 8.01.31
- 8.01.32
- 8.01.33
- 8.01.34
- 8.01.35
- 8.01.36
- 8.01.37
- 8.01.38
- 8.01.39
- 8.01.40
- 8.01.41
- 8.01.42
- 8.01.43
- 8.01.44
- 8.01.45
- 8.01.46
- 8.01.47
- 8.01.48
- 8.01.49
- 8.01.50
- 8.01.51
- 8.01.52
- 8.01.53
- 8.01.54
- 8.01.55
- 8.01.56
- 8.01.57
- 8.01.58
- 8.01.59
- 8.01.60
- 8.01.61
- 8.01.62
- 8.01.63
- 8.01.64
- 8.01.65
- 8.01.66
- 8.01.67
- 8.01.68
- 8.01.69
- 8.01.70
- 8.01.71
- 8.01.72
- 8.01.73
- 8.01.74
- 8.01.75
- 8.01.76
- 8.01.77
- 8.01.78
- 8.01.79
- 8.01.80
- 8.01.81
- 8.01.82
- 8.01.83
- 8.01.84
- 8.01.85
- 8.01.86
License
Website
- Vendor: https://www.lenovo.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 6.5VulDB Meta Temp Score: 6.5
VulDB Base Score: 5.3
VulDB Temp Score: 5.3
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 7.8
NVD Vector: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Hard-coded credentialsCWE: CWE-798 / CWE-259 / CWE-255
CAPEC: 🔍
ATT&CK: 🔍
Physical: Partially
Local: Yes
Remote: No
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Qualys ID: 🔍
Qualys Name: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: no mitigation knownStatus: 🔍
0-Day Time: 🔍
Timeline
12/16/2016 🔍01/25/2018 🔍
01/25/2018 🔍
01/25/2018 🔍
01/26/2018 🔍
01/26/2018 🔍
02/01/2021 🔍
Sources
Vendor: lenovo.comAdvisory: support.lenovo.com
Researcher: Jackson Thuraisamy
Status: Not defined
Confirmation: 🔍
CVE: CVE-2017-3762 (🔍)
GCVE (CVE): GCVE-0-2017-3762
GCVE (VulDB): GCVE-100-112476
SecurityFocus: 102837 - Lenovo Fingerprint Manager Pro CVE-2017-3762 Multiple Local Security Weaknesses
Entry
Created: 01/26/2018 10:33Updated: 02/01/2021 17:28
Changes: 01/26/2018 10:33 (45), 12/28/2019 07:49 (10), 02/01/2021 17:24 (13), 02/01/2021 17:28 (1)
Complete: 🔍
Cache ID: 216:F41:103
Once again VulDB remains the best source for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.