Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13455: CWE-290: Authentication Bypass by Spoofing in Lenovo ThinkPlus FU100

0
High
VulnerabilityCVE-2025-13455cvecve-2025-13455cwe-290
Published: Wed Jan 14 2026 (01/14/2026, 22:18:24 UTC)
Source: CVE Database V5
Vendor/Project: Lenovo
Product: ThinkPlus FU100

Description

CVE-2025-13455 is a high-severity authentication bypass vulnerability affecting Lenovo ThinkPlus FU100 Gen 1 devices. It allows a local authenticated user with limited privileges to bypass device authentication and enroll an untrusted fingerprint, potentially granting unauthorized biometric access. The vulnerability does not require user interaction but does require local authenticated access. Exploitation could compromise the confidentiality and integrity of biometric authentication, enabling attackers to impersonate legitimate users. No known exploits are currently in the wild, and no patches have been released yet. European organizations using Lenovo ThinkPlus FU100 devices, especially in sectors relying on biometric security, are at risk. Mitigation involves restricting local access, monitoring for unauthorized fingerprint enrollments, and applying vendor updates once available. Countries with high Lenovo market penetration and strategic industries using biometric devices, such as Germany, France, and the UK, are most likely affected.

AI-Powered Analysis

AILast updated: 01/14/2026, 22:47:20 UTC

Technical Analysis

CVE-2025-13455 is an authentication bypass vulnerability categorized under CWE-290, discovered in the Lenovo ThinkPlus FU100 Gen 1 biometric device configuration software. The flaw allows a local authenticated user with limited privileges to circumvent the device's fingerprint authentication mechanism and enroll an untrusted fingerprint. This bypass occurs due to insufficient verification during the enrollment process, enabling attackers to add fingerprints that are not legitimately authorized. The vulnerability requires local access with some level of authentication (low privileges) but does not require user interaction beyond that. The CVSS 4.0 base score is 7.3, indicating high severity, with attack vector local (AV:L), low attack complexity (AC:L), partial attack traceability (AT:P), and low privileges required (PR:L). The impact on confidentiality, integrity, and availability is high, as unauthorized biometric enrollment can lead to unauthorized access to systems protected by the device. No patches or known exploits are currently available, but the vulnerability is published and should be addressed promptly. The ThinkPlus FU100 is used primarily in enterprise environments for biometric authentication, making this vulnerability significant for organizations relying on biometric security for access control.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the security of biometric authentication systems. Unauthorized fingerprint enrollment can allow attackers to impersonate legitimate users, potentially gaining access to sensitive systems, data, or physical locations secured by the ThinkPlus FU100 device. This could lead to data breaches, intellectual property theft, or unauthorized physical access. Sectors such as finance, government, healthcare, and critical infrastructure that rely on biometric authentication are particularly vulnerable. The local access requirement limits remote exploitation but does not eliminate risk, especially in environments with shared or insufficiently controlled local access. The lack of patches increases exposure time, and the high integrity and confidentiality impact could undermine trust in biometric security solutions across affected organizations.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately restrict local access to systems equipped with the ThinkPlus FU100 device, enforcing strict access controls and monitoring for unusual enrollment activities. Implement enhanced logging and alerting on biometric enrollment events to detect unauthorized fingerprint additions. Until a vendor patch is available, consider disabling fingerprint enrollment features or using alternative authentication methods where feasible. Conduct regular audits of enrolled fingerprints to identify and remove any untrusted entries. Educate users and administrators about the risk and ensure physical security of devices to prevent unauthorized local access. Once Lenovo releases a patch or update, prioritize its deployment across all affected devices. Additionally, consider network segmentation and endpoint protection measures to limit the potential impact of compromised devices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
lenovo
Date Reserved
2025-11-19T19:32:11.639Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6968198df809b25a98d5529d

Added to database: 1/14/2026, 10:32:45 PM

Last enriched: 1/14/2026, 10:47:20 PM

Last updated: 1/14/2026, 11:14:26 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats