Lucian Constantin
CSO Senior Writer

Lenovo patches serious flaw in pre-installed support tool

news
May 6, 20162 mins

The flaw could allow attackers to gain higher privileges on compromised computers

Lenovo has fixed a vulnerability in its Lenovo Solution Center support tool that could allow attackers to execute code with system privileges and take over computers.

The Lenovo Solution Center (LSC) is an application that comes pre-installed on many Lenovo laptops and desktops. It allows users to check their system’s virus and firewall status, update their software, perform backups, check battery health, get registration and warranty information and run hardware tests.

The tool has two components: a graphical user interface and a service called LSCTaskService that runs in the background at all times even if the user interface is not started.

The Lenovo Solution Center version 3.3.002, released on April 25, contains a fix for a local privilege escalation vulnerability reported by a security researcher from Trustwave. The flaw could allow a local Windows user, or an attacker who compromises a local user, to execute malicious code with system privileges and take control of the whole OS.

This is not the first time such a vulnerability was found and fixed in LSC. In fact, Lenovo updated an old advisory for flaws reported in December with information about the new vulnerability, making it somewhat hard to spot.

Users should automatically be prompted to update LSC when they open the application, but in case they don’t, they should download the latest version manually from Lenovo’s website.

This incident continues the trend of serious flaws being found in applications that PC manufacturers pre-install on their products whether they are their own support tools or third-party software programs from partners. Pre-installed software that is generally not wanted by users or requires more resources than necessary to function is sometimes called “bloatware.”

Lucian Constantin

Lucian Constantin writes about information security, privacy, and data protection for CSO. Before joining CSO in 2019, Lucian was a freelance writer for VICE Motherboard, Security Boulevard, Forbes, and The New Stack. Earlier in his career, he was an information security correspondent for the IDG News Service and Information security news editor for Softpedia.

Before he became a journalist, Lucian worked as a system and network administrator. He enjoys attending security conferences and delving into interesting research papers. He lives and works in Romania.

You can reach him at lucian_constantin@foundryco.com or @lconstantin on X. For encrypted email, his PGP key's fingerprint is: 7A66 4901 5CDA 844E 8C6D 04D5 2BB4 6332 FC52 6D42

More from this author