CVE-2024-5474

5.5 MEDIUM

📋 TL;DR

A local privilege escalation vulnerability in Lenovo's Dolby Vision Provisioning software allows attackers to read arbitrary files with elevated privileges during package installation. Only systems installing affected versions are vulnerable; previously installed versions are not impacted. This affects Lenovo devices with the vulnerable software package.

💻 Affected Systems

Products:
  • Lenovo Dolby Vision Provisioning software
Versions: Versions prior to 2.0.0.2
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only vulnerable during installation of the affected package. Systems with previously installed versions are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains unauthorized read access to sensitive system files, potentially exposing credentials, configuration data, or other confidential information.

🟠

Likely Case

Local user with basic privileges reads protected files they shouldn't have access to, potentially compromising system security or user privacy.

🟢

If Mitigated

Attack fails due to proper access controls or the vulnerability being patched before exploitation attempts.

🌐 Internet-Facing: LOW - This is a local attack requiring physical or remote desktop access to the system.
🏢 Internal Only: MEDIUM - Internal users with local access could exploit this to escalate privileges and access sensitive files.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires local access to the system and exploitation during package installation. No public exploit code has been disclosed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.0.0.2

Vendor Advisory: https://support.lenovo.com/us/en/product_security/LEN-158394

Restart Required: No

Instructions:

1. Download Dolby Vision Provisioning software version 2.0.0.2 or later from Lenovo support site. 2. Install the updated package following Lenovo's installation instructions. 3. Verify the installation completed successfully.

🔧 Temporary Workarounds

Avoid installation of vulnerable packages

windows

Do not install Dolby Vision Provisioning software versions prior to 2.0.0.2

Restrict local access during installation

windows

Ensure only trusted administrators perform software installations and restrict local user access during installation processes

🧯 If You Can't Patch

  • Implement strict access controls to limit who can install software on affected systems
  • Monitor for unauthorized file access attempts and installation activities on vulnerable systems

🔍 How to Verify

Check if Vulnerable:

Check if Dolby Vision Provisioning software version is earlier than 2.0.0.2 in installed programs or during installation process

Check Version:

wmic product where name="Dolby Vision Provisioning" get version

Verify Fix Applied:

Confirm installed version is 2.0.0.2 or later via Programs and Features or software version check

📡 Detection & Monitoring

Log Indicators:

  • Failed file access attempts with elevated privileges
  • Installation logs showing vulnerable software version installation

Network Indicators:

  • No network indicators - this is a local attack

SIEM Query:

EventID=4688 AND ProcessName LIKE '%Dolby%' AND CommandLine LIKE '%install%'

🔗 References

📤 Share & Export