Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13454: CWE-319: Cleartext Transmission of Sensitive Information in Lenovo ThinkPlus FU100

0
Medium
VulnerabilityCVE-2025-13454cvecve-2025-13454cwe-319
Published: Wed Jan 14 2026 (01/14/2026, 22:18:18 UTC)
Source: CVE Database V5
Vendor/Project: Lenovo
Product: ThinkPlus FU100

Description

A potential vulnerability was reported in ThinkPlus configuration software that could allow a local authenticated user to gain access to sensitive device information.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 08:52:04 UTC

Technical Analysis

CVE-2025-13454 is a vulnerability identified in the Lenovo ThinkPlus FU100 Gen 1 device, specifically within its configuration software. The issue stems from the cleartext transmission of sensitive information, classified under CWE-319, which denotes the exposure of sensitive data during network communication without encryption. This vulnerability requires a local authenticated user to exploit, meaning the attacker must have some level of access to the device or system where the software is installed. Once exploited, the attacker can intercept or access sensitive device information that should otherwise be protected. The CVSS 4.0 vector indicates that the attack vector is local (AV:L), with low attack complexity (AC:L), no attack prerequisites (AT:N), and requires privileges (PR:L). There is no user interaction (UI:N) needed, and the vulnerability impacts confidentiality (VC:H) but not integrity or availability. The lack of known exploits in the wild and absence of patches suggests this is a newly disclosed issue. The vulnerability's root cause is the failure to encrypt sensitive data during transmission within the local environment, which could be leveraged by malicious insiders or compromised local accounts to gather device information that might facilitate further attacks or unauthorized access.

Potential Impact

The primary impact of CVE-2025-13454 is the potential compromise of confidentiality of sensitive device information on Lenovo ThinkPlus FU100 Gen 1 devices. If exploited, attackers with local authenticated access could intercept or retrieve sensitive configuration or operational data, which might include credentials, device identifiers, or configuration parameters. This information leakage could facilitate lateral movement within an organization’s network, aid in privilege escalation, or enable targeted attacks against the affected devices or connected infrastructure. While the vulnerability does not directly affect system integrity or availability, the exposure of sensitive information can undermine trust in the device’s security posture and lead to broader security incidents. Organizations relying on these devices in sensitive environments, such as enterprise offices, government agencies, or critical infrastructure, could face increased risk of insider threats or local compromise. The medium severity rating reflects the limited attack vector but significant confidentiality impact if exploited.

Mitigation Recommendations

To mitigate CVE-2025-13454, organizations should implement strict access controls to limit local authenticated access to trusted personnel only, reducing the risk of exploitation by unauthorized users. Network segmentation and endpoint security measures can help contain potential attackers with local access. Monitoring and logging local user activities on devices running ThinkPlus FU100 software can provide early detection of suspicious behavior. Since no patches are currently available, Lenovo users should stay alert for official updates or firmware/software patches addressing this vulnerability and apply them promptly once released. Additionally, organizations can consider encrypting local communications at the network level using VPNs or secure tunnels to add an extra layer of protection against interception. Reviewing and hardening device configuration and disabling unnecessary services that transmit sensitive data in cleartext can further reduce exposure. Finally, educating users about the risks of local credential compromise and enforcing strong authentication policies will help mitigate the threat.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
lenovo
Date Reserved
2025-11-19T19:32:11.064Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6968198df809b25a98d5529a

Added to database: 1/14/2026, 10:32:45 PM

Last enriched: 2/27/2026, 8:52:04 AM

Last updated: 3/26/2026, 6:40:13 AM

Views: 79

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses