CVE-2025-13455: CWE-290: Authentication Bypass by Spoofing in Lenovo ThinkPlus FU100
CVE-2025-13455 is a high-severity authentication bypass vulnerability affecting Lenovo ThinkPlus FU100 Gen 1 devices. It allows a local authenticated user with limited privileges to bypass device authentication and enroll an untrusted fingerprint, potentially granting unauthorized biometric access. The vulnerability does not require user interaction but does require local authenticated access. Exploitation could compromise the confidentiality and integrity of biometric authentication, enabling attackers to impersonate legitimate users. No known exploits are currently in the wild, and no patches have been released yet. European organizations using Lenovo ThinkPlus FU100 devices, especially in sectors relying on biometric security, are at risk. Mitigation involves restricting local access, monitoring for unauthorized fingerprint enrollments, and applying vendor updates once available. Countries with high Lenovo market penetration and strategic industries using biometric devices, such as Germany, France, and the UK, are most likely affected.
AI Analysis
Technical Summary
CVE-2025-13455 is an authentication bypass vulnerability categorized under CWE-290, discovered in the Lenovo ThinkPlus FU100 Gen 1 biometric device configuration software. The flaw allows a local authenticated user with limited privileges to circumvent the device's fingerprint authentication mechanism and enroll an untrusted fingerprint. This bypass occurs due to insufficient verification during the enrollment process, enabling attackers to add fingerprints that are not legitimately authorized. The vulnerability requires local access with some level of authentication (low privileges) but does not require user interaction beyond that. The CVSS 4.0 base score is 7.3, indicating high severity, with attack vector local (AV:L), low attack complexity (AC:L), partial attack traceability (AT:P), and low privileges required (PR:L). The impact on confidentiality, integrity, and availability is high, as unauthorized biometric enrollment can lead to unauthorized access to systems protected by the device. No patches or known exploits are currently available, but the vulnerability is published and should be addressed promptly. The ThinkPlus FU100 is used primarily in enterprise environments for biometric authentication, making this vulnerability significant for organizations relying on biometric security for access control.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the security of biometric authentication systems. Unauthorized fingerprint enrollment can allow attackers to impersonate legitimate users, potentially gaining access to sensitive systems, data, or physical locations secured by the ThinkPlus FU100 device. This could lead to data breaches, intellectual property theft, or unauthorized physical access. Sectors such as finance, government, healthcare, and critical infrastructure that rely on biometric authentication are particularly vulnerable. The local access requirement limits remote exploitation but does not eliminate risk, especially in environments with shared or insufficiently controlled local access. The lack of patches increases exposure time, and the high integrity and confidentiality impact could undermine trust in biometric security solutions across affected organizations.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately restrict local access to systems equipped with the ThinkPlus FU100 device, enforcing strict access controls and monitoring for unusual enrollment activities. Implement enhanced logging and alerting on biometric enrollment events to detect unauthorized fingerprint additions. Until a vendor patch is available, consider disabling fingerprint enrollment features or using alternative authentication methods where feasible. Conduct regular audits of enrolled fingerprints to identify and remove any untrusted entries. Educate users and administrators about the risk and ensure physical security of devices to prevent unauthorized local access. Once Lenovo releases a patch or update, prioritize its deployment across all affected devices. Additionally, consider network segmentation and endpoint protection measures to limit the potential impact of compromised devices.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2025-13455: CWE-290: Authentication Bypass by Spoofing in Lenovo ThinkPlus FU100
Description
CVE-2025-13455 is a high-severity authentication bypass vulnerability affecting Lenovo ThinkPlus FU100 Gen 1 devices. It allows a local authenticated user with limited privileges to bypass device authentication and enroll an untrusted fingerprint, potentially granting unauthorized biometric access. The vulnerability does not require user interaction but does require local authenticated access. Exploitation could compromise the confidentiality and integrity of biometric authentication, enabling attackers to impersonate legitimate users. No known exploits are currently in the wild, and no patches have been released yet. European organizations using Lenovo ThinkPlus FU100 devices, especially in sectors relying on biometric security, are at risk. Mitigation involves restricting local access, monitoring for unauthorized fingerprint enrollments, and applying vendor updates once available. Countries with high Lenovo market penetration and strategic industries using biometric devices, such as Germany, France, and the UK, are most likely affected.
AI-Powered Analysis
Technical Analysis
CVE-2025-13455 is an authentication bypass vulnerability categorized under CWE-290, discovered in the Lenovo ThinkPlus FU100 Gen 1 biometric device configuration software. The flaw allows a local authenticated user with limited privileges to circumvent the device's fingerprint authentication mechanism and enroll an untrusted fingerprint. This bypass occurs due to insufficient verification during the enrollment process, enabling attackers to add fingerprints that are not legitimately authorized. The vulnerability requires local access with some level of authentication (low privileges) but does not require user interaction beyond that. The CVSS 4.0 base score is 7.3, indicating high severity, with attack vector local (AV:L), low attack complexity (AC:L), partial attack traceability (AT:P), and low privileges required (PR:L). The impact on confidentiality, integrity, and availability is high, as unauthorized biometric enrollment can lead to unauthorized access to systems protected by the device. No patches or known exploits are currently available, but the vulnerability is published and should be addressed promptly. The ThinkPlus FU100 is used primarily in enterprise environments for biometric authentication, making this vulnerability significant for organizations relying on biometric security for access control.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the security of biometric authentication systems. Unauthorized fingerprint enrollment can allow attackers to impersonate legitimate users, potentially gaining access to sensitive systems, data, or physical locations secured by the ThinkPlus FU100 device. This could lead to data breaches, intellectual property theft, or unauthorized physical access. Sectors such as finance, government, healthcare, and critical infrastructure that rely on biometric authentication are particularly vulnerable. The local access requirement limits remote exploitation but does not eliminate risk, especially in environments with shared or insufficiently controlled local access. The lack of patches increases exposure time, and the high integrity and confidentiality impact could undermine trust in biometric security solutions across affected organizations.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately restrict local access to systems equipped with the ThinkPlus FU100 device, enforcing strict access controls and monitoring for unusual enrollment activities. Implement enhanced logging and alerting on biometric enrollment events to detect unauthorized fingerprint additions. Until a vendor patch is available, consider disabling fingerprint enrollment features or using alternative authentication methods where feasible. Conduct regular audits of enrolled fingerprints to identify and remove any untrusted entries. Educate users and administrators about the risk and ensure physical security of devices to prevent unauthorized local access. Once Lenovo releases a patch or update, prioritize its deployment across all affected devices. Additionally, consider network segmentation and endpoint protection measures to limit the potential impact of compromised devices.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- lenovo
- Date Reserved
- 2025-11-19T19:32:11.639Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6968198df809b25a98d5529d
Added to database: 1/14/2026, 10:32:45 PM
Last enriched: 1/14/2026, 10:47:20 PM
Last updated: 1/14/2026, 11:14:26 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0600: CWE-918 Server-Side Request Forgery (SSRF) in Sonatype Nexus Repository
MediumCVE-2025-14058: CWE-306: Missing Authentication for Critical Function in Lenovo Tab M11 TB330FU TB330XU
LowCVE-2025-12533
LowCVE-2025-12166: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in croixhaug Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin
HighCVE-2026-0421: CWE-252: Unchecked Return Value in Lenovo ThinkPad L13 Gen 6 BIOS
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.