Lenovo has released a new version of its System Update software to address a couple of privilege escalation vulnerabilities discovered by an IOActive researcher.
Lenovo System Update, previously known as ThinkVantage System Update, is a piece of software designed to help users quickly obtain driver, BIOS and application updates for Lenovo and Think systems.
The first vulnerability identified by IOActive researcher Sofiane Talmat can be exploited by a local unprivileged attacker to gain administrator privileges on the targeted system (CVE-2015-8109). The flaw, rated “critical” by the company, is related to a temporary administrator account created when System Update is executed.
According to an advisory from IOActive, since System Update can be run even by unprivileged users, the System Update service SUService.exe, which has system privileges, creates a temporary admin account and uses it to launch the update tool’s graphical interface (Tvsukernel.exe).
The problem is that while both the username and the password for the temporary admin account are randomly generated, in certain circumstances an attacker could predict the credentials and use them to gain administrator privileges on the targeted machine.
A related security bug found by Talmat allows a local unprivileged attacker to execute commands with the privileges of the Windows system user (CVE-2015-8110).
The System Update GUI application that is executed with the temporary administrator account includes links to various support pages on Lenovo’s website. When one of these links is clicked, the webpages are opened in a web browser launched using the temporary admin account, allowing an unprivileged attacker to leverage this browser session to elevate their privileges.
The vulnerabilities were reported to Lenovo on November 2 and they were patched on November 19 with the release of System Update 5.07.0019.
Lenovo has released several new versions of its System Update software this year to address a total of ten vulnerabilities, including issues reported by researchers from Trustwave, IOActive and Tencent’s Xuanwu Lab.

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- AntChain, Intel Create New Privacy-Preserving Computing Platform for AI Training
- Several Major Organizations Confirm Being Impacted by MOVEit Attack
- Verizon 2023 DBIR: Human Error Involved in Many Breaches, Ransomware Cost Surges
- Google Patches Third Chrome Zero-Day of 2023
- Ransomware Group Used MOVEit Exploit to Steal Data From Dozens of Organizations
- Cybersecurity M&A Roundup: 36 Deals Announced in May 2023
- In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack
- Apple Denies Helping US Government Hack Russian iPhones
Latest News
- KeePass Update Patches Vulnerability Exposing Master Password
- AntChain, Intel Create New Privacy-Preserving Computing Platform for AI Training
- Keep Aware Raises $2.4M to Eliminate Browser Blind Spots
- Google Workspace Gets Passkey Authentication
- Cybersecurity Startup Elba Raises €2.5 Million for Employee-Focused Product
- Zoom Expands Privacy Options for European Customers
- Several Major Organizations Confirm Being Impacted by MOVEit Attack
- Apple Unveils Upcoming Privacy and Security Features
