A buffer overflow vulnerability in Lenovo Protection Driver could allow local attackers with elevated privileges to execute arbitrary code on affected systems. The vulnerability, designated as CVE-2025-4657, affects multiple Lenovo applications and poses significant security risks to desktop, ThinkCentre, laptop, and ThinkPad users. Buffer overflow vulnerability allows attackers to execute arbitrary code and escalate privileges on Lenovo systems. Security researchers have classified this as a high-priority issue due to its potential impact on system integrity and the widespread deployment of affected Lenovo software across enterprise and consumer environments. Users should update Lenovo PC Manager to version 5.1.110.5082 or higher, Lenovo Browser to version 9.0.6.5061 or higher, and Lenovo App Store to version 9.0.2230.0617 or higher. These applications are commonly pre-installed on Lenovo systems and are widely used across the company’s device ecosystem, including desktop computers, ThinkCentre workstations, laptops, and ThinkPad business notebooks. Lenovo has released security patches for all affected applications and strongly recommends immediate updates. The flaw represents a significant security concern as it enables privilege escalation, allowing attackers to execute arbitrary code with system-level permissions. Users can verify their current driver version by navigating to this location, right-clicking the lrtp.sys file, selecting Properties, then Details, and checking the file version information.
This Cyber News was published on cybersecuritynews.com. Publication date: Fri, 18 Jul 2025 12:15:19 +0000