CVE-2023-3112

7.8 HIGH

📋 TL;DR

A local privilege escalation vulnerability in Elliptic Labs Virtual Lock Sensor for Lenovo ThinkPad T14 Gen 3 allows attackers with physical or remote desktop access to execute arbitrary code with SYSTEM/root privileges. This affects ThinkPad T14 Gen 3 laptops running vulnerable versions of the sensor software. Attackers must already have local access to the system to exploit this flaw.

💻 Affected Systems

Products:
  • Lenovo ThinkPad T14 Gen 3
Versions: Virtual Lock Sensor versions prior to the fixed version specified in Lenovo advisory
Operating Systems: Windows 10, Windows 11
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Elliptic Labs Virtual Lock Sensor installed. This is typically pre-installed on ThinkPad T14 Gen 3 laptops.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains full SYSTEM/root control of the laptop, enabling installation of persistent malware, credential theft, data exfiltration, and lateral movement within the network.

🟠

Likely Case

Malicious insider or malware with user-level access escalates to full system control, potentially compromising sensitive data and system integrity.

🟢

If Mitigated

With proper access controls and patching, impact is limited to denial of service or temporary disruption if exploitation is attempted.

🌐 Internet-Facing: LOW - Requires local access; not directly exploitable over internet without prior access.
🏢 Internal Only: HIGH - Any compromised user account or malware with local execution can exploit this to gain full system control.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires local access but likely straightforward to exploit once local access is obtained. No public exploit code available as of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update through Lenovo Vantage or System Update with firmware/software updates addressing LEN-128081

Vendor Advisory: https://support.lenovo.com/us/en/product_security/LEN-128081

Restart Required: Yes

Instructions:

1. Open Lenovo Vantage or Lenovo System Update. 2. Check for available updates. 3. Install all firmware and driver updates. 4. Restart the system when prompted. 5. Verify update completion in Lenovo Vantage.

🔧 Temporary Workarounds

Disable Virtual Lock Sensor

windows

Temporarily disable the vulnerable component until patching can be completed

Open Device Manager > Software components > Right-click 'Elliptic Labs Virtual Lock Sensor' > Disable device

Restrict Local Access

all

Implement strict access controls to limit who can log in locally to affected systems

🧯 If You Can't Patch

  • Implement strict physical security controls for affected laptops
  • Apply principle of least privilege and monitor for unusual local privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check Device Manager > Software components for 'Elliptic Labs Virtual Lock Sensor' and verify version through Lenovo Vantage > Hardware Settings > Component Information

Check Version:

wmic path Win32_PnPSignedDriver where "DeviceName like '%Elliptic Labs Virtual Lock Sensor%'" get DeviceName,DriverVersion

Verify Fix Applied:

In Lenovo Vantage, check update history for LEN-128081 fix installation and verify no vulnerable sensor version is present in Device Manager

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing unexpected privilege escalation
  • Security logs with unusual process creation from sensor components
  • Application logs showing Virtual Lock Sensor errors or crashes

Network Indicators:

  • Unusual outbound connections from affected systems post-exploitation
  • Lateral movement attempts from ThinkPad T14 Gen 3 systems

SIEM Query:

source="*windows*" AND (process_name="*elliptic*" OR process_name="*virtual_lock*") AND (event_id="4688" OR event_id="4672")

🔗 References

📤 Share & Export