CVE-2026-1716
Input Validation Flaw in Lenovo DeviceSettingsSystemAddin Enables Privilege Escalation
Publication date: 2026-03-11
Last updated on: 2026-03-25
Assigner: Lenovo Group Ltd.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| lenovo | vantage | to 1.0.8.15 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-88 | The product constructs a string for a command to be executed by a separate component in another control sphere, but it does not properly delimit the intended arguments, options, or switches within that command string. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an input validation flaw found in the DeviceSettingsSystemAddin component used by Lenovo Vantage and Lenovo Baiying software.
It allows a local authenticated user to delete arbitrary registry keys with elevated privileges, which means the user can manipulate system registry settings beyond their normal permissions.
How can this vulnerability impact me? :
The vulnerability can impact you by allowing a local authenticated user to delete critical registry keys with elevated privileges.
This could lead to system instability, malfunction of software or hardware components, or potential escalation of privileges if exploited.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know