Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13155: CWE-276: Incorrect Default Permissions in Lenovo Baiying Client

0
High
VulnerabilityCVE-2025-13155cvecve-2025-13155cwe-276
Published: Wed Dec 10 2025 (12/10/2025, 14:08:56 UTC)
Source: CVE Database V5
Vendor/Project: Lenovo
Product: Baiying Client

Description

An improper permissions vulnerability was reported in Lenovo Baiying Client that could allow a local authenticated user to execute code with elevated privileges.

AI-Powered Analysis

AILast updated: 12/10/2025, 14:37:53 UTC

Technical Analysis

CVE-2025-13155 is an improper permissions vulnerability identified in the Lenovo Baiying Client software. The root cause is incorrect default permissions set on files or directories used by the application, classified under CWE-276 (Incorrect Default Permissions). This misconfiguration allows a local authenticated user—meaning someone with legitimate access to the system—to execute arbitrary code with elevated privileges, effectively escalating their rights beyond intended limits. The vulnerability does not require user interaction and has low attack complexity, making exploitation relatively straightforward once local access is obtained. The CVSS 4.0 vector (AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) reflects that the attack vector is local, no specialized privileges beyond authenticated user are needed, and the impact on confidentiality, integrity, and availability is high. Although no public exploits or patches are currently available, the vulnerability poses a significant risk because it can lead to full system compromise by local attackers. The Lenovo Baiying Client is a proprietary software product, and the affected version is indicated as '0', which likely means the initial or all versions prior to a fix are vulnerable. Organizations using this client should consider this a critical local privilege escalation threat.

Potential Impact

For European organizations, this vulnerability presents a serious risk of local privilege escalation, potentially allowing attackers who have gained limited access (e.g., through phishing, insider threat, or other means) to elevate their privileges to administrative or system level. This can lead to unauthorized access to sensitive data, disruption of critical services, and the ability to install persistent malware or backdoors. Given Lenovo's strong presence in European enterprise and government sectors, especially in countries with large IT infrastructures such as Germany, France, and the UK, the impact could be widespread. Critical infrastructure, financial institutions, and public sector organizations relying on Lenovo hardware and software may face increased risk of targeted attacks exploiting this vulnerability. The lack of a patch increases exposure time, and the absence of required user interaction lowers the barrier for exploitation once local access is achieved.

Mitigation Recommendations

1. Immediately audit and restrict file and directory permissions related to the Lenovo Baiying Client to ensure they follow the principle of least privilege, preventing unauthorized modification or execution. 2. Limit local user accounts and enforce strict access controls to reduce the number of users who can exploit this vulnerability. 3. Implement robust endpoint detection and response (EDR) solutions to monitor for unusual local privilege escalation attempts or suspicious process executions. 4. Prepare for rapid deployment of official patches or updates from Lenovo once released; maintain close communication with Lenovo security advisories. 5. Employ application whitelisting and integrity monitoring to detect unauthorized changes to the Baiying Client files. 6. Conduct user awareness training to reduce the risk of initial local access through social engineering or insider threats. 7. Consider network segmentation to isolate systems running the Baiying Client, limiting lateral movement opportunities for attackers.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
lenovo
Date Reserved
2025-11-13T21:58:00.862Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6939823e5f410c6b20a89964

Added to database: 12/10/2025, 2:22:54 PM

Last enriched: 12/10/2025, 2:37:53 PM

Last updated: 12/10/2025, 4:26:53 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats