CVE-2025-13453: CWE-311: Missing Encryption of Sensitive Data in Lenovo ThinkPlus FU100
A potential vulnerability was reported in some ThinkPlus USB drives that could allow a user with physical access to read data stored on the drive.
AI Analysis
Technical Summary
CVE-2025-13453 identifies a vulnerability in Lenovo's ThinkPlus FU100 Gen 1 USB drives characterized by the absence of encryption for sensitive data stored on the device. Classified under CWE-311 (Missing Encryption of Sensitive Data), this flaw means that any data saved on these USB drives is stored in plaintext or otherwise unprotected form. An attacker with physical access to the device can directly read the data without needing any authentication or user interaction, significantly lowering the barrier to exploitation. The CVSS 4.0 vector (AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H) indicates that while physical access is required, the attack complexity is low, and the impact on confidentiality, integrity, and availability is high. No patches or firmware updates have been released yet, and no exploits have been observed in the wild. This vulnerability poses a critical risk for data confidentiality, especially in environments where these USB drives are used to transport or store sensitive corporate or personal data. Since the vulnerability is hardware-based and tied to the device’s design, software mitigations may be limited, necessitating alternative protective measures. The vulnerability was publicly disclosed in January 2026, with Lenovo as the vendor, highlighting the need for immediate risk assessment and mitigation by affected users.
Potential Impact
For European organizations, the primary impact is the potential exposure of sensitive data stored on ThinkPlus FU100 Gen 1 USB drives if devices are lost, stolen, or accessed by unauthorized personnel. This can lead to data breaches involving personal data, intellectual property, or confidential business information, resulting in regulatory penalties under GDPR and reputational damage. The vulnerability affects confidentiality most severely but also impacts data integrity and availability if attackers modify or delete data. Sectors relying heavily on portable storage for secure data transport, such as finance, healthcare, government, and critical infrastructure, face elevated risks. The ease of exploitation without authentication or user interaction increases the threat level, especially in environments with less stringent physical security controls. The lack of encryption means that traditional endpoint security solutions may not detect or prevent data extraction from the device. This vulnerability could also complicate compliance with European data protection laws that mandate encryption of sensitive data at rest. Organizations may face increased costs related to incident response, forensic investigations, and potential legal liabilities.
Mitigation Recommendations
Given the hardware nature of the vulnerability and absence of available patches, European organizations should immediately cease using Lenovo ThinkPlus FU100 Gen 1 USB drives for storing sensitive data. Implement full disk encryption solutions at the operating system or application level before writing data to the USB drive to ensure data confidentiality. Employ strict physical security controls to limit access to USB drives, including secure storage and inventory management. Use endpoint security tools capable of monitoring USB device usage and data transfers to detect unauthorized activities. Educate employees on the risks of using unencrypted portable storage devices and enforce policies restricting their use for sensitive information. Consider transitioning to USB drives with built-in hardware encryption certified by recognized standards (e.g., FIPS 140-2). Regularly audit and review data handling practices involving portable media to ensure compliance with GDPR and internal security policies. If retention of these devices is unavoidable, implement layered security controls such as password protection combined with software encryption. Monitor threat intelligence sources for any emerging exploits and Lenovo advisories for firmware updates or device replacements.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2025-13453: CWE-311: Missing Encryption of Sensitive Data in Lenovo ThinkPlus FU100
Description
A potential vulnerability was reported in some ThinkPlus USB drives that could allow a user with physical access to read data stored on the drive.
AI-Powered Analysis
Technical Analysis
CVE-2025-13453 identifies a vulnerability in Lenovo's ThinkPlus FU100 Gen 1 USB drives characterized by the absence of encryption for sensitive data stored on the device. Classified under CWE-311 (Missing Encryption of Sensitive Data), this flaw means that any data saved on these USB drives is stored in plaintext or otherwise unprotected form. An attacker with physical access to the device can directly read the data without needing any authentication or user interaction, significantly lowering the barrier to exploitation. The CVSS 4.0 vector (AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H) indicates that while physical access is required, the attack complexity is low, and the impact on confidentiality, integrity, and availability is high. No patches or firmware updates have been released yet, and no exploits have been observed in the wild. This vulnerability poses a critical risk for data confidentiality, especially in environments where these USB drives are used to transport or store sensitive corporate or personal data. Since the vulnerability is hardware-based and tied to the device’s design, software mitigations may be limited, necessitating alternative protective measures. The vulnerability was publicly disclosed in January 2026, with Lenovo as the vendor, highlighting the need for immediate risk assessment and mitigation by affected users.
Potential Impact
For European organizations, the primary impact is the potential exposure of sensitive data stored on ThinkPlus FU100 Gen 1 USB drives if devices are lost, stolen, or accessed by unauthorized personnel. This can lead to data breaches involving personal data, intellectual property, or confidential business information, resulting in regulatory penalties under GDPR and reputational damage. The vulnerability affects confidentiality most severely but also impacts data integrity and availability if attackers modify or delete data. Sectors relying heavily on portable storage for secure data transport, such as finance, healthcare, government, and critical infrastructure, face elevated risks. The ease of exploitation without authentication or user interaction increases the threat level, especially in environments with less stringent physical security controls. The lack of encryption means that traditional endpoint security solutions may not detect or prevent data extraction from the device. This vulnerability could also complicate compliance with European data protection laws that mandate encryption of sensitive data at rest. Organizations may face increased costs related to incident response, forensic investigations, and potential legal liabilities.
Mitigation Recommendations
Given the hardware nature of the vulnerability and absence of available patches, European organizations should immediately cease using Lenovo ThinkPlus FU100 Gen 1 USB drives for storing sensitive data. Implement full disk encryption solutions at the operating system or application level before writing data to the USB drive to ensure data confidentiality. Employ strict physical security controls to limit access to USB drives, including secure storage and inventory management. Use endpoint security tools capable of monitoring USB device usage and data transfers to detect unauthorized activities. Educate employees on the risks of using unencrypted portable storage devices and enforce policies restricting their use for sensitive information. Consider transitioning to USB drives with built-in hardware encryption certified by recognized standards (e.g., FIPS 140-2). Regularly audit and review data handling practices involving portable media to ensure compliance with GDPR and internal security policies. If retention of these devices is unavoidable, implement layered security controls such as password protection combined with software encryption. Monitor threat intelligence sources for any emerging exploits and Lenovo advisories for firmware updates or device replacements.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- lenovo
- Date Reserved
- 2025-11-19T19:32:10.395Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6968198df809b25a98d55297
Added to database: 1/14/2026, 10:32:45 PM
Last enriched: 1/14/2026, 10:47:41 PM
Last updated: 1/14/2026, 11:37:50 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0600: CWE-918 Server-Side Request Forgery (SSRF) in Sonatype Nexus Repository
MediumCVE-2025-14058: CWE-306: Missing Authentication for Critical Function in Lenovo Tab M11 TB330FU TB330XU
LowCVE-2025-12533
UnknownCVE-2025-12166: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in croixhaug Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin
HighCVE-2026-0421: CWE-252: Unchecked Return Value in Lenovo ThinkPad L13 Gen 6 BIOS
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.