CVE-2025-14058

3.2 LOW

📋 TL;DR

A missing authentication vulnerability in some Lenovo Tablets allows unauthorized users with physical access to modify Control Center settings when the device is locked, even when the 'Allow Control Center access when locked' option is disabled. This affects Lenovo Tablet users who have disabled this setting but leave devices unattended in locked state.

💻 Affected Systems

Products:
  • Lenovo Tablets
Versions: Specific models and firmware versions not specified in advisory
Operating Systems: Android-based Lenovo Tablet OS
Default Config Vulnerable: ✅ No
Notes: Only affects devices where 'Allow Control Center access when locked' option is disabled. Vulnerability occurs when this setting is bypassed despite being disabled.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with physical access could modify critical device settings, potentially enabling further attacks or compromising device functionality and user privacy.

🟠

Likely Case

Unauthorized users could change Control Center settings like connectivity options, display settings, or accessibility features when accessing a locked device.

🟢

If Mitigated

With proper physical security controls and user awareness, the impact is minimal as it requires physical device access.

🌐 Internet-Facing: LOW - This vulnerability requires physical access to the device and cannot be exploited remotely.
🏢 Internal Only: MEDIUM - In environments where devices are shared or left unattended, unauthorized users could modify settings affecting device functionality.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires physical access to a locked device. No authentication bypass needed beyond physical access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in advisory - check Lenovo support for specific firmware updates

Vendor Advisory: https://support.lenovo.com/us/en/product_security/LEN-207951

Restart Required: Yes

Instructions:

1. Check Lenovo support site for your specific tablet model. 2. Download and install the latest firmware update. 3. Restart the device after installation.

🔧 Temporary Workarounds

Enable Control Center access when locked

all

Enable the 'Allow Control Center access when locked' option to prevent the authentication bypass condition

Use stronger lock screen security

all

Implement PIN, pattern, or biometric authentication instead of swipe-to-unlock

🧯 If You Can't Patch

  • Maintain strict physical security controls for devices
  • Never leave devices unattended in public or shared spaces

🔍 How to Verify

Check if Vulnerable:

Check if Control Center settings can be modified when device is locked with 'Allow Control Center access when locked' disabled

Check Version:

Check Settings > About Tablet > Build Number or Software Version

Verify Fix Applied:

After applying firmware update, verify Control Center cannot be accessed/modified when device is locked with the setting disabled

📡 Detection & Monitoring

Log Indicators:

  • Unexpected Control Center setting changes
  • Access attempts while device locked

Network Indicators:

  • None - local physical access only

SIEM Query:

Not applicable - physical access vulnerability

🔗 References

📤 Share & Export