CERT mailing list archives

Lenovo Accelerator Application Vulnerability


From: "US-CERT" <US-CERT () ncas us-cert gov>
Date: Thu, 02 Jun 2016 10:08:17 -0500

U.S. Department of Homeland Security US-CERT

National Cyber Awareness System:

 

Lenovo Accelerator Application Vulnerability [ 
https://www.us-cert.gov/ncas/current-activity/2016/06/02/Lenovo-Accelerator-Application-Vulnerability ] 06/02/2016 
10:12 AM EDT 
Original release date: June 02, 2016

Lenovo has issued a security advisory to address a vulnerability in the Accelerator Application software. Products 
impacted by this vulnerability include the Lenovo notebook and desktop systems preloaded with the Windows 10 operating 
system.  Exploitation of this vulnerability may allow a remote attacker to take control of an affected system.

Users and administrators are encouraged to review the Lenovo Security Advisory [ 
https://support.lenovo.com/us/en/product_security/len_6718 ] and apply the recommended mitigation strategy.

________________________________________________________________________

This product is provided subject to this Notification [ http://www.us-cert.gov/privacy/notification ] and this Privacy 
& Use [ http://www.us-cert.gov/privacy/ ] policy.

________________________________________________________________________

A copy of this publication is available at www.us-cert.gov [ https://www.us-cert.gov ]. If you need help or have 
questions, please send an email to info () us-cert gov. Do not reply to this message since this email was sent from a 
notification-only address that is not monitored. To ensure you receive future US-CERT products, please add US-CERT () 
ncas us-cert gov to your address book. 

OTHER RESOURCES: Contact Us [ http://www.us-cert.gov/contact-us/ ] | Security Publications [ 
http://www.us-cert.gov/security-publications ] | Alerts and Tips [ http://www.us-cert.gov/ncas ] | Related Resources [ 
http://www.us-cert.gov/related-resources ]  

STAY CONNECTED: Sign up for email updates [ http://public.govdelivery.com/accounts/USDHSUSCERT/subscriber/new ] 


Current thread: