CVE-2025-12048

7.5 HIGH

📋 TL;DR

An arbitrary file upload vulnerability in Lenovo Scanner Pro client allows attackers to upload malicious files that could lead to remote code execution. This affects users of Lenovo Scanner Pro software on Windows systems. Successful exploitation could give attackers unauthorized control over the affected system.

💻 Affected Systems

Products:
  • Lenovo Scanner Pro
Versions: Specific versions not detailed in reference, but all versions prior to patched release are likely affected
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the scanner client software during file upload operations. Requires the scanner software to be installed and in use.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with remote code execution leading to data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Local privilege escalation leading to unauthorized access to sensitive scanner data and system resources.

🟢

If Mitigated

Limited impact with proper file validation and restricted user permissions preventing malicious uploads.

🌐 Internet-Facing: MEDIUM - Requires user interaction or network access to scanner client, but not directly internet-exposed by default.
🏢 Internal Only: HIGH - Internal attackers or compromised internal systems could exploit this to move laterally within networks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires ability to interact with the scanner client's file upload functionality. No public exploit code available at time of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Lenovo advisory for specific patched version

Vendor Advisory: https://iknow.lenovo.com.cn/detail/434326

Restart Required: Yes

Instructions:

1. Visit Lenovo advisory URL. 2. Download latest Lenovo Scanner Pro version. 3. Uninstall current version. 4. Install updated version. 5. Restart system.

🔧 Temporary Workarounds

Disable Scanner Pro Service

windows

Temporarily disable the scanner service to prevent exploitation

sc stop "Lenovo Scanner Pro Service"
sc config "Lenovo Scanner Pro Service" start= disabled

Restrict File Upload Permissions

all

Configure strict file type validation and upload restrictions

🧯 If You Can't Patch

  • Network segmentation to isolate scanner systems from critical infrastructure
  • Implement strict application whitelisting to prevent execution of unauthorized files

🔍 How to Verify

Check if Vulnerable:

Check Lenovo Scanner Pro version against advisory. If version is older than patched release, system is vulnerable.

Check Version:

Check program version in Windows Add/Remove Programs or scanner software about dialog

Verify Fix Applied:

Verify installed version matches or exceeds patched version from Lenovo advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to scanner directories
  • Execution of unexpected files from scanner temp folders

Network Indicators:

  • Unexpected network connections originating from scanner process
  • File transfers to scanner service ports

SIEM Query:

Process Creation where Image contains 'scanner' AND CommandLine contains unusual file extensions (.exe, .bat, .ps1)

🔗 References

📤 Share & Export