Original Article Text

Click to Toggle View

New Lenovo UEFI firmware updates fix Secure Boot bypass flaws. Lenovo is warning of high-severity BIOS flaws that could let attackers bypass Secure Boot on all-in-one desktops using customized Insyde UEFI firmware. Devices confirmed to be impacted are IdeaCentre AIO 3 24ARR9 and 27ARR9, and the Yoga AIO 27IAH10, 32ILL10, and 32IRH8. UEFI is the modern replacement for the traditional PC BIOS, acting as a firmware interface between the computer's hardware and the OS, controlling early initialization and booting. The flaws, discovered by Binarly, mirror those the researchers uncovered earlier this month, which impacted dozens of Gigabyte motherboard models, enabling local attackers to execute arbitrary code in System Management Mode (SMM). The SMM is a CPU mode that is separate from the operating system (OS) and hypervisor, running with higher privileges at a lower level (Ring-2). Exploiting flaws in SMM could help attackers plant 'undetectable' malware, bypassing OS-level security defenses, such as SecureBoot. InsydeH2O is one of the most widely deployed commercial UEFI BIOS frameworks used in OEM laptops and desktops. Insyde also published a bulletin explaining that the flaws arise from OEM-specific customizations made by Lenovo in InsydeH2O UEFI firmware images, and do not apply to all systems using InsydeH2O UEFI. "The newly identified Lenovo vulnerabilities arise from the same recurring challenges tied to inconsistencies within the software supply chain," commented Binarly's Alex Matrosov to BleepingComputer. "All six vulnerabilities were found in System Management Mode (SMM)‑level code, the invisible layer of firmware that loads before your operating system and persists after every re‑image, making them perfect launch pads for stealthy implants and Secure Boot bypasses." The six flaws are summarized as follows: Binarly reported the vulnerabilities to Lenovo on April 8, 2025, and received confirmation from the company on June 16. The coordinated disclosure was published yesterday, following the expiration of the 90-day disclosure window. Lenovo has released firmware security updates for IdeaCenter AIO 3 models, urging users to upgrade to version O6BKT1AA. Yoga AIO updates aren't currently available, but the computer vendor plans to release fixes between September 30 and November 30, 2025. The Board Report Deck CISOs Actually Use CISOs know that getting board buy-in starts with a clear, strategic view of how cloud security drives business value. This free, editable board report deck helps security leaders present risk, impact, and priorities in clear business terms. Turn security updates into meaningful conversations and faster decision-making in the boardroom.

Daily Brief Summary

MALWARE // Lenovo Issues Firmware Updates to Combat Secure Boot Flaws

Lenovo has announced updates to fix high-severity BIOS flaws in various all-in-one desktops that could allow attackers to bypass Secure Boot.

The security vulnerabilities impact specific models including IdeaCentre AIO 3 24ARR9 and 27ARR9, and the Yoga AIO 27IAH10, 32ILL10, and 32IRH8.

These vulnerabilities, identified by security firm Binarly, exploit the System Management Mode (SMM)

a highly privileged CPU mode operating outside the OS and hypervisor layers.

The reported flaws could potentially enable the deployment of nearly undetectable malware by bypassing operating system-level security measures such as SecureBoot.

InsydeH2O, a widely used UEFI BIOS framework in various OEM devices, was highlighted as having vulnerabilities due to specific customizations by Lenovo.

Lenovo acknowledged the issues following Binarly's report on April 8, 2025, and has published firmware updates for impacted models as part of a 90-day coordinated disclosure.

The company reported that updates for the Yoga AIO series are forthcoming, with expected availability between September 30 and November 30, 2025.

These security flaws underscore recurring challenges related to inconsistencies within software supply chains, posing significant risks for stealthy attacks and system integrity breaches.