CVE-2025-13455

7.8 HIGH

📋 TL;DR

A local authentication bypass vulnerability in ThinkPlus configuration software allows authenticated users to enroll untrusted fingerprints on ThinkPlus devices. This affects organizations using ThinkPlus biometric authentication systems where local users have access to configuration software. The vulnerability enables unauthorized fingerprint enrollment, potentially compromising biometric security controls.

💻 Affected Systems

Products:
  • ThinkPlus configuration software
Versions: Specific versions not detailed in advisory; all versions prior to patch are likely affected
Operating Systems: Windows (based on typical ThinkPlus deployment)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local authenticated access to ThinkPlus configuration software. Likely affects systems where ThinkPlus devices are deployed for biometric authentication.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious insider or compromised account enrolls unauthorized fingerprints, allowing persistent unauthorized physical access to secured areas or systems protected by ThinkPlus biometric authentication.

🟠

Likely Case

Local user with legitimate access bypasses fingerprint enrollment controls to add unauthorized users, potentially enabling unauthorized access to secured resources.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to potential policy violation detection without actual security breach.

🌐 Internet-Facing: LOW - This is a local authentication bypass requiring physical or network access to the configuration software.
🏢 Internal Only: HIGH - Affects internal systems where local users can access ThinkPlus configuration software, potentially compromising biometric access controls.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local authenticated access to the configuration software. The vulnerability appears to be an authentication bypass in the enrollment process.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in advisory

Vendor Advisory: https://iknow.lenovo.com.cn/detail/436983

Restart Required: Yes

Instructions:

1. Visit Lenovo's security advisory page. 2. Download the latest ThinkPlus configuration software update. 3. Install the update on all systems running ThinkPlus configuration software. 4. Restart affected systems.

🔧 Temporary Workarounds

Restrict configuration software access

all

Limit access to ThinkPlus configuration software to authorized administrators only

Monitor fingerprint enrollment logs

all

Implement logging and alerting for fingerprint enrollment activities

🧯 If You Can't Patch

  • Implement strict access controls to limit who can run ThinkPlus configuration software
  • Enable detailed audit logging for all fingerprint enrollment activities and review regularly

🔍 How to Verify

Check if Vulnerable:

Check ThinkPlus configuration software version against Lenovo's security advisory. Systems running unpatched versions are vulnerable.

Check Version:

Check within ThinkPlus configuration software interface or consult software documentation for version checking method

Verify Fix Applied:

Verify ThinkPlus configuration software has been updated to the patched version specified in Lenovo's advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected fingerprint enrollment events
  • Multiple fingerprint enrollments from single user account
  • Enrollment attempts outside normal business hours

Network Indicators:

  • Unusual network traffic to/from ThinkPlus configuration software

SIEM Query:

source="thinkplus" AND (event_type="enrollment" OR event_type="fingerprint_add") | stats count by user, timestamp

🔗 References

📤 Share & Export