Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-8061: CWE-782: Exposed IOCTL with Insufficient Access Control in Lenovo Dispatcher 3.0 Driver

0
High
VulnerabilityCVE-2025-8061cvecve-2025-8061cwe-782
Published: Thu Sep 11 2025 (09/11/2025, 18:34:52 UTC)
Source: CVE Database V5
Vendor/Project: Lenovo
Product: Dispatcher 3.0 Driver

Description

A potential insufficient access control vulnerability was reported in the Lenovo Dispatcher 3.0 and Dispatcher 3.1 drivers used by some Lenovo consumer notebooks that could allow an authenticated local user to execute code with elevated privileges. The Lenovo Dispatcher 3.2 driver is not affected. This vulnerability does not affect systems when the Windows feature Core Isolation Memory Integrity is enabled. Lenovo systems preloaded with Windows 11 have this feature enabled by default.

AI-Powered Analysis

AILast updated: 09/23/2025, 00:24:55 UTC

Technical Analysis

CVE-2025-8061 is a high-severity vulnerability identified in the Lenovo Dispatcher 3.0 and 3.1 drivers, which are components used in certain Lenovo consumer notebooks. The vulnerability stems from an exposed IOCTL (Input Output Control) interface that lacks sufficient access control, classified under CWE-782 (Exposed IOCTL with Insufficient Access Control). This flaw allows an authenticated local user with limited privileges to execute arbitrary code with elevated privileges, effectively enabling privilege escalation on affected systems. The vulnerability does not impact Lenovo Dispatcher 3.2 or later versions. Additionally, systems with the Windows Core Isolation Memory Integrity feature enabled are not vulnerable; this feature is enabled by default on Lenovo devices preloaded with Windows 11. The CVSS v4.0 base score is 7.3, indicating a high severity level. The vector string (AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) shows that the attack requires local access with high attack complexity and low privileges but no user interaction. The vulnerability affects confidentiality, integrity, and availability at a high level, allowing attackers to gain elevated code execution capabilities. No known exploits are currently reported in the wild, and no patches or updates have been linked yet. This vulnerability poses a significant risk to affected Lenovo consumer notebooks running Dispatcher 3.0 or 3.1 drivers without Core Isolation Memory Integrity enabled.

Potential Impact

For European organizations using Lenovo consumer notebooks with Dispatcher 3.0 or 3.1 drivers, this vulnerability presents a serious risk of local privilege escalation. An attacker or malicious insider with authenticated local access could leverage this flaw to gain administrative control over the system, potentially leading to unauthorized access to sensitive data, installation of persistent malware, or disruption of system availability. This is particularly concerning for organizations with bring-your-own-device (BYOD) policies or those that allow local user access without strict endpoint controls. The fact that Windows 11 systems with Core Isolation Memory Integrity enabled are not affected reduces the risk for newer devices or those with updated security configurations. However, many enterprises in Europe still operate legacy hardware or have not fully adopted Windows 11, leaving them exposed. The vulnerability could facilitate lateral movement within networks, compromise endpoint security, and undermine trust in Lenovo hardware platforms. Given the high severity and the potential for privilege escalation, organizations must prioritize identification and remediation to prevent exploitation.

Mitigation Recommendations

1. Verify and inventory Lenovo consumer notebooks to identify devices running Dispatcher 3.0 or 3.1 drivers. 2. Enable Windows Core Isolation Memory Integrity on all affected devices where possible, as this feature mitigates the vulnerability effectively. 3. Upgrade Lenovo Dispatcher drivers to version 3.2 or later once available from Lenovo, as these versions are not affected. 4. Restrict local user access to trusted personnel only and enforce least privilege principles to reduce the risk of exploitation by authenticated users. 5. Implement endpoint detection and response (EDR) solutions capable of monitoring suspicious local privilege escalation attempts and IOCTL calls. 6. Monitor Lenovo security advisories closely for patches or updates addressing this vulnerability and apply them promptly. 7. For devices that cannot be updated or have Core Isolation disabled, consider isolating them from sensitive networks or applying additional host-based security controls to limit potential damage. 8. Conduct user awareness training to highlight the risks of local privilege escalation and the importance of device security hygiene.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
lenovo
Date Reserved
2025-07-22T20:46:17.396Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c3168a00f99c09afdc9644

Added to database: 9/11/2025, 6:35:54 PM

Last enriched: 9/23/2025, 12:24:55 AM

Last updated: 10/29/2025, 9:32:37 AM

Views: 88

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats