CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-23592

Medium Severity
SVRS
30/100

CVSSv3
NA/10

EPSS
0.00038/1

CVE-2024-23592 is an authentication bypass vulnerability affecting Lenovo devices using Synaptics fingerprint readers. This flaw allows an attacker with physical access to potentially replay fingerprints and circumvent Windows Hello authentication. With an SVRS of 30, while not critical, this vulnerability still presents a risk and should be monitored. The fingerprint reader vulnerability means unauthorized access could be gained if an attacker manages to capture and replay a valid fingerprint. Although the CVSS score is 0, the SVRS considers real-world exploitability from sources like dark web mentions and social media, indicating a potential risk that shouldn't be ignored. This is significant because it could compromise the security of Lenovo devices relying on fingerprint authentication, allowing unauthorized users to access sensitive data. Mitigation steps should be considered, especially in environments with elevated physical security risks.

In The Wild
2024-04-05

2024-04-08

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

CVE-2024-23592 | Lenovo Synaptics Fingerprint Readers security check
vuldb.com2025-04-08
CVE-2024-23592 | Lenovo Synaptics Fingerprint Readers security check | A vulnerability classified as critical has been found in Lenovo Synaptics Fingerprint Readers. This affects an unknown part. The manipulation leads to security check for standard. This vulnerability is uniquely identified as CVE-2024-23592. It is possible to launch the attack on the physical device. There is no exploit available.
vuldb.com
rss
forum
news

Social Media

No tweets found for this CVE

Affected Software

No affected software found for this CVE

References

ReferenceLink
[email protected]https://support.lenovo.com/us/en/product_security/LEN-155804

CWE Details

CWE IDCWE NameDescription
CWE-358Improperly Implemented Security Check for StandardThe software does not implement or incorrectly implements one or more security-relevant checks as specified by the design of a standardized algorithm, protocol, or technique.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence