Badge
11,371 badges added since 01 January 2025
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions

Lenovo is a US$69 billion revenue global technology powerhouse, ranked #196 in the Fortune Global 500, and serving millions of customers every day in 180 markets. Focused on a bold vision to deliver Smarter Technology for All, Lenovo has built on its success as the world’s largest PC company with a full-stack portfolio of AI-enabled, AI-ready, and AI-optimized devices (PCs, workstations, smartphones, tablets), infrastructure (server, storage, edge, high performance computing and software defined infrastructure), software, solutions, and services. Lenovo’s continued investment in world-changing innovation is building a more equitable, trustworthy, and smarter future for everyone, everywhere. Lenovo is listed on the Hong Kong stock exchange under Lenovo Group Limited (HKSE: 992) (ADR: LNVGY). To find out more visit https://www.lenovo.com, and read about the latest news via our StoryHub at https://news.lenovo.com/. To learn more about our career opportunities, visit our careers page at http://jobs.lenovo.com/.

Lenovo A.I CyberSecurity Scoring

Lenovo

Company Details

Linkedin ID:

lenovo

Employees number:

46,066

Number of followers:

1,250,702

NAICS:

5415

Industry Type:

IT Services and IT Consulting

Homepage:

lenovo.com

IP Addresses:

0

Company ID:

LEN_3024493

Scan Status:

In-progress

AI scoreLenovo Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/lenovo.jpeg
Lenovo IT Services and IT Consulting
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
Get a Score Increase
globalscoreLenovo Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/lenovo.jpeg
Lenovo IT Services and IT Consulting
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Lenovo Company CyberSecurity News & History

Past Incidents
3
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsSupply Chain SourceIncident DetailsView
LenovoVulnerability8548/2025NA
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Critical vulnerabilities were discovered in Lenovo’s AI-powered customer support chatbot, Lena, which leverages OpenAI’s GPT-4. The flaw stemmed from improper input and output sanitization, exposing the system to cross-site scripting (XSS) attacks. Security researchers at Cybernews demonstrated that attackers could exploit this by injecting malicious code via a 400-character prompt, tricking the AI into generating harmful HTML content. This enabled threat actors to steal session cookies, potentially granting unauthorized access to Lenovo’s customer support systems.The vulnerability highlighted significant risks in poorly secured AI implementations, particularly as enterprises accelerate AI adoption. While no evidence of active exploitation was reported, the flaw posed a serious threat to customer data integrity and system security. Had attackers successfully leveraged this, they could have compromised user sessions, accessed sensitive support-related information, or escalated privileges within Lenovo’s infrastructure. The incident underscores the urgency for robust AI security frameworks to prevent such exposures in high-stakes enterprise environments.

LenovoVulnerability10056/2023NA
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: Lenovo devices running on vulnerable Insyde firmware were targeted by the BootKitty Linux UEFI bootkit exploiting the LogoFAIL flaws (CVE-2023-40238). BootKitty bypassed UEFI Secure Boot by injecting rogue certificates and exploiting vulnerabilities in UEFI image-parsing components through tampered BMP files. The bootkit was capable of disabling kernel signature verification, preloading malicious binaries, and targeting specific Ubuntu versions. Despite available security patches, many devices remained at risk. The incident served as a reminder of the dangers associated with unaddressed vulnerabilities and the importance of timely updates to safeguard devices in the field.

LenovoVulnerability2516/2019NA
Rankiteo Explanation :
Attack without any consequences

Description: A significant security vulnerability has been discovered in Lenovo’s preloaded Windows operating systems, where a writable file in the Windows directory enables attackers to bypass Microsoft’s AppLocker security framework. The issue affects all variants of Lenovo machines running default Windows installations and poses serious implications for enterprise security environments. Key takeaways include the writable MFGSTAT.zip file bypassing AppLocker security due to incorrect permissions, the use of Alternate Data Streams to hide executables, and the persistence of the vulnerability from 2019 to 2025. Mitigation strategies involve removing the vulnerable file using PowerShell or other enterprise management tools.

Lenovo
Vulnerability
Severity: 85
Impact: 4
Seen: 8/2025
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: Critical vulnerabilities were discovered in Lenovo’s AI-powered customer support chatbot, Lena, which leverages OpenAI’s GPT-4. The flaw stemmed from improper input and output sanitization, exposing the system to cross-site scripting (XSS) attacks. Security researchers at Cybernews demonstrated that attackers could exploit this by injecting malicious code via a 400-character prompt, tricking the AI into generating harmful HTML content. This enabled threat actors to steal session cookies, potentially granting unauthorized access to Lenovo’s customer support systems.The vulnerability highlighted significant risks in poorly secured AI implementations, particularly as enterprises accelerate AI adoption. While no evidence of active exploitation was reported, the flaw posed a serious threat to customer data integrity and system security. Had attackers successfully leveraged this, they could have compromised user sessions, accessed sensitive support-related information, or escalated privileges within Lenovo’s infrastructure. The incident underscores the urgency for robust AI security frameworks to prevent such exposures in high-stakes enterprise environments.

Lenovo
Vulnerability
Severity: 100
Impact: 5
Seen: 6/2023
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack threatening the organization’s existence

Description: Lenovo devices running on vulnerable Insyde firmware were targeted by the BootKitty Linux UEFI bootkit exploiting the LogoFAIL flaws (CVE-2023-40238). BootKitty bypassed UEFI Secure Boot by injecting rogue certificates and exploiting vulnerabilities in UEFI image-parsing components through tampered BMP files. The bootkit was capable of disabling kernel signature verification, preloading malicious binaries, and targeting specific Ubuntu versions. Despite available security patches, many devices remained at risk. The incident served as a reminder of the dangers associated with unaddressed vulnerabilities and the importance of timely updates to safeguard devices in the field.

Lenovo
Vulnerability
Severity: 25
Impact: 1
Seen: 6/2019
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack without any consequences

Description: A significant security vulnerability has been discovered in Lenovo’s preloaded Windows operating systems, where a writable file in the Windows directory enables attackers to bypass Microsoft’s AppLocker security framework. The issue affects all variants of Lenovo machines running default Windows installations and poses serious implications for enterprise security environments. Key takeaways include the writable MFGSTAT.zip file bypassing AppLocker security due to incorrect permissions, the use of Alternate Data Streams to hide executables, and the persistence of the vulnerability from 2019 to 2025. Mitigation strategies involve removing the vulnerable file using PowerShell or other enterprise management tools.

Ailogo

Lenovo Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Lenovo

Incidents vs IT Services and IT Consulting Industry Average (This Year)

No incidents recorded for Lenovo in 2026.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Lenovo in 2026.

Incident Types Lenovo vs IT Services and IT Consulting Industry Avg (This Year)

No incidents recorded for Lenovo in 2026.

Incident History — Lenovo (X = Date, Y = Severity)

Lenovo cyber incidents detection timeline including parent company and subsidiaries

Lenovo Company Subsidiaries

SubsidiaryImage

Lenovo is a US$69 billion revenue global technology powerhouse, ranked #196 in the Fortune Global 500, and serving millions of customers every day in 180 markets. Focused on a bold vision to deliver Smarter Technology for All, Lenovo has built on its success as the world’s largest PC company with a full-stack portfolio of AI-enabled, AI-ready, and AI-optimized devices (PCs, workstations, smartphones, tablets), infrastructure (server, storage, edge, high performance computing and software defined infrastructure), software, solutions, and services. Lenovo’s continued investment in world-changing innovation is building a more equitable, trustworthy, and smarter future for everyone, everywhere. Lenovo is listed on the Hong Kong stock exchange under Lenovo Group Limited (HKSE: 992) (ADR: LNVGY). To find out more visit https://www.lenovo.com, and read about the latest news via our StoryHub at https://news.lenovo.com/. To learn more about our career opportunities, visit our careers page at http://jobs.lenovo.com/.

Loading...
similarCompanies

Lenovo Similar Companies

Softtek

Founded in 1982 by a small group of entrepreneurs, Softtek started out in Mexico providing local IT services, and today is a global leader in next-generation digital solutions. The first company to introduce the Nearshore model, Softtek helps Global 2000 organizations build their digital capabilitie

Allianz Technology

With its headquarters in Munich, Germany, Allianz Technology is Allianz's global IT service provider and delivers IT solutions that drive the group's digitalization. With more than 11,000 employees in more than 20 countries around the world, Allianz Technology is tasked to run, optimize, transform,

TELUS Digital

TELUS Digital crafts unique and enduring experiences for customers and employees, and creates future-focused digital transformations that stand the test of time. We are the brand behind the brands. Our global team members are both passionate ambassadors of our clients’ products and services, and vis

UST is a global digital transformation solutions provider. For more than 20 years, UST has worked side by side with the world’s best companies to make a real impact through transformation. Powered by technology, inspired by people and led by purpose, UST partners with their clients from design to

AlmavivA Experience

Líder em transformação digital nos mercados de Customer Experience e Debt Collection na América Latina. Combinamos tecnologia, inteligência e excelência operacional para entregar soluções completas que antecipam as necessidades dos nossos Clientes. São mais de 530 milhões de interações anuais, met

Engineering Group

Engineering Group is the Digital Transformation Company, leader in Italy and expanding its global footprint, with around 14,000 associates and with over 80 offices spread across Europe, the United States, and South America and global delivery. The Engineering Group, consisting of over 70 companies

Akkodis

Akkodis is a global digital engineering company and Smart Industry leader. We enable clients to advance in their digital transformation with Talent, Academy, Consulting, and Solutions services. Our 50,000 experts combine best-in-class technologies, R&D, and deep sector know-how for purposeful innova

Mphasis

A leading applied technology services company, we innovate to deliver service excellence and successful outcomes across sales, delivery and development. With our strategy to be agile, nimble and customer-centric, we anticipate the future of applied technology and predict tomorrow’s trends to keep ou

Oracle

We’re a cloud technology company that provides organizations around the world with computing infrastructure and software to help them innovate, unlock efficiencies and become more effective. We also created the world’s first – and only – autonomous database to help organize and secure our customers’

newsone

Lenovo CyberSecurity News

February 18, 2026 08:00 AM
Lenovo Expands Global R&D Footprint with New AI Innovation Centers and a Digital Trust Lab

Lenovo is expanding its global Research & Development (R&D) capabilities by adding new facilities in the Europe, Middle East,...

February 17, 2026 08:00 AM
US Law Firm Accuses Lenovo of Bulk Data Transfers to China

The lawsuit explicitly connects these alleged transfers to Executive Order 14117's implementing framework, arguing that cross-border access to...

January 09, 2026 08:00 AM
Lenovo Makes a Splash at CES; Debuts Tech World with Major Device and AI Infrastructure Announcements

Key announcements from Lenovo AI TechWorld at CES 2026, covering the QIRA AI agent, AI PCs, and the NVIDIA AI Cloud Gigafactory.

December 11, 2025 08:00 AM
IT Leaders Face New Era of AI-Powered Cyber Threats

Lenovo reveals 65% of IT leaders say current architecture fails against AI threats, urging defences for endpoints, identities and AI...

November 29, 2025 08:00 AM
“There's no such thing as 100% - we just try and raise the bar” - we hear what it takes to help secure the world’s largest PC maker from the man in charge of Lenovo’s AI and security

AI can be a dual-edged sword when it comes to security, Lenovo chief tells us.

November 25, 2025 08:00 AM
Lenovo Q2 FY 2026 Earnings Highlight Hybrid AI Mix Gains

Lenovo Q2 FY 2026 shows AI growth across PCs, servers, and services, with rising AI mix pointing to hybrid AI adoption ahead.

November 20, 2025 03:52 AM
Reinforcing the Modern Workplace

IT leaders are under pressure to transform the digital workplace and supercharge employee productivity with AI. But as security threats evolve,...

November 10, 2025 08:00 AM
Lenovo PCCW Solutions Brings Together 18 New Technology Partners to Launch "Next-Gen IT Ecosystem"

Combining Lenovo's global resources with LPS' local expertise, the Next-Gen ecosystem covers four key domains: application software,...

October 28, 2025 07:00 AM
Building a foundation of security and trust to lead the AI era

Doug Fisher on centering trust, from AI governance to our global supply chain, and from how we design products to how we protect data.

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Lenovo CyberSecurity History Information

Official Website of Lenovo

The official website of Lenovo is http://www.lenovo.com.

Lenovo’s AI-Generated Cybersecurity Score

According to Rankiteo, Lenovo’s AI-generated cybersecurity score is 787, reflecting their Fair security posture.

How many security badges does Lenovo’ have ?

According to Rankiteo, Lenovo currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Has Lenovo been affected by any supply chain cyber incidents ?

According to Rankiteo, Lenovo has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.

Does Lenovo have SOC 2 Type 1 certification ?

According to Rankiteo, Lenovo is not certified under SOC 2 Type 1.

Does Lenovo have SOC 2 Type 2 certification ?

According to Rankiteo, Lenovo does not hold a SOC 2 Type 2 certification.

Does Lenovo comply with GDPR ?

According to Rankiteo, Lenovo is not listed as GDPR compliant.

Does Lenovo have PCI DSS certification ?

According to Rankiteo, Lenovo does not currently maintain PCI DSS compliance.

Does Lenovo comply with HIPAA ?

According to Rankiteo, Lenovo is not compliant with HIPAA regulations.

Does Lenovo have ISO 27001 certification ?

According to Rankiteo,Lenovo is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Lenovo

Lenovo operates primarily in the IT Services and IT Consulting industry.

Number of Employees at Lenovo

Lenovo employs approximately 46,066 people worldwide.

Subsidiaries Owned by Lenovo

Lenovo presently has no subsidiaries across any sectors.

Lenovo’s LinkedIn Followers

Lenovo’s official LinkedIn profile has approximately 1,250,702 followers.

NAICS Classification of Lenovo

Lenovo is classified under the NAICS code 5415, which corresponds to Computer Systems Design and Related Services.

Lenovo’s Presence on Crunchbase

Yes, Lenovo has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/lenovo.

Lenovo’s Presence on LinkedIn

Yes, Lenovo maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/lenovo.

Cybersecurity Incidents Involving Lenovo

As of March 28, 2026, Rankiteo reports that Lenovo has experienced 3 cybersecurity incidents.

Number of Peer and Competitor Companies

Lenovo has an estimated 39,816 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Lenovo ?

Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability.

How does Lenovo detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with remove the vulnerable file using powershell or command prompt, and remediation measures with use enterprise management tools like group policy preferences or sccm..

Incident Details

Can you provide details on each incident ?

Incident : UEFI Bootkit

Title: Lenovo Devices Targeted by BootKitty Linux UEFI Bootkit

Description: Lenovo devices running on vulnerable Insyde firmware were targeted by the BootKitty Linux UEFI bootkit exploiting the LogoFAIL flaws (CVE-2023-40238). BootKitty bypassed UEFI Secure Boot by injecting rogue certificates and exploiting vulnerabilities in UEFI image-parsing components through tampered BMP files. The bootkit was capable of disabling kernel signature verification, preloading malicious binaries, and targeting specific Ubuntu versions. Despite available security patches, many devices remained at risk. The incident served as a reminder of the dangers associated with unaddressed vulnerabilities and the importance of timely updates to safeguard devices in the field.

Type: UEFI Bootkit

Attack Vector: UEFI Secure Boot Bypass

Vulnerability Exploited: LogoFAIL flaws (CVE-2023-40238)

Threat Actor: BootKitty

Incident : Vulnerability Exploitation

Title: Lenovo Preloaded Windows Vulnerability

Description: A significant security vulnerability has been discovered in Lenovo’s preloaded Windows operating systems, where a writable file in the Windows directory enables attackers to bypass Microsoft’s AppLocker security framework.

Date Detected: 2019

Type: Vulnerability Exploitation

Attack Vector: Alternate Data Streams (ADS)

Vulnerability Exploited: Writable MFGSTAT.zip file with incorrect permissions

Incident : Vulnerability Exploitation

Title: Critical XSS Vulnerabilities in Lenovo’s AI-Powered Customer Support Chatbot 'Lena'

Description: Critical vulnerabilities were discovered in Lenovo’s AI-powered customer support chatbot, 'Lena' (powered by OpenAI’s GPT-4), allowing attackers to steal session cookies and potentially gain unauthorized access to customer support systems via a single malicious 400-character prompt. The flaw stemmed from improper input/output sanitization, enabling cross-site scripting (XSS) attacks by injecting malicious code through crafted prompts, which tricked the AI into generating harmful HTML content. The incident highlights security risks in poorly implemented AI chatbots as organizations rapidly adopt AI in enterprise environments.

Type: Vulnerability Exploitation

Attack Vector: Malicious Prompt Injection (400-character payload)

Vulnerability Exploited: Improper Input/Output Sanitization in AI Chatbot (XSS)

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Vulnerability.

How does the company identify the attack vectors used in incidents ?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through AI Chatbot ('Lena') via Malicious Prompt.

Impact of the Incidents

What was the impact of each incident ?

Incident : UEFI Bootkit LEN001120824

Systems Affected: Lenovo devices

Incident : Vulnerability Exploitation LEN749070725

Systems Affected: All Lenovo machines with preloaded Windows

Incident : Vulnerability Exploitation LEN532082025

Data Compromised: Session cookies, Potential unauthorized access to customer support systems

Systems Affected: Lenovo AI Chatbot 'Lena' (GPT-4 Powered)

Operational Impact: Potential Unauthorized Access to Customer Support Systems

Brand Reputation Impact: High (Warning About AI Security Risks in Enterprise Adoption)

Identity Theft Risk: Potential (via Stolen Session Cookies)

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Session Cookies and .

Which entities were affected by each incident ?

Incident : UEFI Bootkit LEN001120824

Entity Name: Lenovo

Entity Type: Corporation

Industry: Technology

Incident : Vulnerability Exploitation LEN749070725

Entity Name: Lenovo

Entity Type: Corporation

Industry: Technology

Incident : Vulnerability Exploitation LEN532082025

Entity Name: Lenovo

Entity Type: Corporation

Industry: Technology (Hardware/Software)

Location: Global (HQ: Hong Kong/China, Operations: Worldwide)

Size: Large (Multinational)

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Vulnerability Exploitation LEN749070725

Containment Measures: Remove the vulnerable file using PowerShell or Command Prompt

Remediation Measures: Use enterprise management tools like Group Policy Preferences or SCCM

Data Breach Information

What type of data was compromised in each breach ?

Incident : Vulnerability Exploitation LEN532082025

Type of Data Compromised: Session cookies

Sensitivity of Data: High (Session Hijacking Risk)

Data Exfiltration: Potential (via XSS)

Personally Identifiable Information: Potential (via Session Cookies)

What measures does the company take to prevent data exfiltration ?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Use enterprise management tools like Group Policy Preferences or SCCM, .

How does the company handle incidents involving personally identifiable information (PII) ?

Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by remove the vulnerable file using powershell or command prompt and .

Lessons Learned and Recommendations

What lessons were learned from each incident ?

Incident : UEFI Bootkit LEN001120824

Lessons Learned: The incident served as a reminder of the dangers associated with unaddressed vulnerabilities and the importance of timely updates to safeguard devices in the field.

Incident : Vulnerability Exploitation LEN749070725

Lessons Learned: The importance of comprehensive filesystem auditing when implementing AppLocker deployments.

Incident : Vulnerability Exploitation LEN532082025

Lessons Learned: The incident underscores the critical need for robust input/output sanitization in AI-powered systems, especially in customer-facing applications. Rapid AI adoption in enterprises must be accompanied by rigorous security testing to mitigate risks like XSS and prompt injection attacks.

What recommendations were made to prevent future incidents ?

Incident : Vulnerability Exploitation LEN749070725

Recommendations: Remove the vulnerable file using PowerShell or Command Prompt, Use enterprise management tools like Group Policy Preferences or SCCMRemove the vulnerable file using PowerShell or Command Prompt, Use enterprise management tools like Group Policy Preferences or SCCM

Incident : Vulnerability Exploitation LEN532082025

Recommendations: Implement strict input/output sanitization for AI chatbots to prevent XSS and prompt injection., Conduct regular security audits and penetration testing for AI systems, particularly those integrated with third-party models (e.g., GPT-4)., Adopt secure coding practices for AI/ML applications, including context-aware filtering for dynamic content generation., Monitor and limit the length/complexity of user prompts to mitigate injection risks., Educate developers and security teams on emerging AI-specific threats (e.g., prompt hacking, model manipulation).Implement strict input/output sanitization for AI chatbots to prevent XSS and prompt injection., Conduct regular security audits and penetration testing for AI systems, particularly those integrated with third-party models (e.g., GPT-4)., Adopt secure coding practices for AI/ML applications, including context-aware filtering for dynamic content generation., Monitor and limit the length/complexity of user prompts to mitigate injection risks., Educate developers and security teams on emerging AI-specific threats (e.g., prompt hacking, model manipulation).Implement strict input/output sanitization for AI chatbots to prevent XSS and prompt injection., Conduct regular security audits and penetration testing for AI systems, particularly those integrated with third-party models (e.g., GPT-4)., Adopt secure coding practices for AI/ML applications, including context-aware filtering for dynamic content generation., Monitor and limit the length/complexity of user prompts to mitigate injection risks., Educate developers and security teams on emerging AI-specific threats (e.g., prompt hacking, model manipulation).Implement strict input/output sanitization for AI chatbots to prevent XSS and prompt injection., Conduct regular security audits and penetration testing for AI systems, particularly those integrated with third-party models (e.g., GPT-4)., Adopt secure coding practices for AI/ML applications, including context-aware filtering for dynamic content generation., Monitor and limit the length/complexity of user prompts to mitigate injection risks., Educate developers and security teams on emerging AI-specific threats (e.g., prompt hacking, model manipulation).Implement strict input/output sanitization for AI chatbots to prevent XSS and prompt injection., Conduct regular security audits and penetration testing for AI systems, particularly those integrated with third-party models (e.g., GPT-4)., Adopt secure coding practices for AI/ML applications, including context-aware filtering for dynamic content generation., Monitor and limit the length/complexity of user prompts to mitigate injection risks., Educate developers and security teams on emerging AI-specific threats (e.g., prompt hacking, model manipulation).

What are the key lessons learned from past incidents ?

Key Lessons Learned: The key lessons learned from past incidents are The incident served as a reminder of the dangers associated with unaddressed vulnerabilities and the importance of timely updates to safeguard devices in the field.The importance of comprehensive filesystem auditing when implementing AppLocker deployments.The incident underscores the critical need for robust input/output sanitization in AI-powered systems, especially in customer-facing applications. Rapid AI adoption in enterprises must be accompanied by rigorous security testing to mitigate risks like XSS and prompt injection attacks.

References

Where can I find more information about each incident ?

Incident : Vulnerability Exploitation LEN749070725

Source: TrustedSec

Incident : Vulnerability Exploitation LEN532082025

Source: Cybernews

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: TrustedSec, and Source: Cybernews.

Investigation Status

What is the current status of the investigation for each incident ?

Incident : Vulnerability Exploitation LEN532082025

Investigation Status: Disclosed by Cybernews Researchers (No Further Updates)

Initial Access Broker

How did the initial access broker gain entry for each incident ?

Incident : Vulnerability Exploitation LEN532082025

Entry Point: AI Chatbot ('Lena') via Malicious Prompt

High Value Targets: Customer Support Systems, Session Cookies,

Data Sold on Dark Web: Customer Support Systems, Session Cookies,

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident ?

Incident : Vulnerability Exploitation LEN749070725

Root Causes: Incorrect file permissions on MFGSTAT.zip

Corrective Actions: Remove The Vulnerable File, Use Enterprise Management Tools For Systematic Removal,

Incident : Vulnerability Exploitation LEN532082025

Root Causes: Lack Of Input/Output Sanitization In Ai Chatbot, Over-Reliance On Third-Party Ai Model (Gpt-4) Without Adequate Security Controls, Insufficient Security Testing For Prompt Injection Vulnerabilities,

What corrective actions has the company taken based on post-incident analysis ?

Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Remove The Vulnerable File, Use Enterprise Management Tools For Systematic Removal, .

Additional Questions

General Information

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident was an BootKitty.

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on 2019.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were Session Cookies, Potential Unauthorized Access to Customer Support Systems and .

What was the most significant system affected in an incident ?

Most Significant System Affected: The most significant system affected in an incident was All Lenovo machines with preloaded Windows and Lenovo AI Chatbot 'Lena' (GPT-4 Powered).

Response to the Incidents

What containment measures were taken in the most recent incident ?

Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Remove the vulnerable file using PowerShell or Command Prompt.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Potential Unauthorized Access to Customer Support Systems and Session Cookies.

Lessons Learned and Recommendations

What was the most significant lesson learned from past incidents ?

Most Significant Lesson Learned: The most significant lesson learned from past incidents was The incident served as a reminder of the dangers associated with unaddressed vulnerabilities and the importance of timely updates to safeguard devices in the field., The importance of comprehensive filesystem auditing when implementing AppLocker deployments., The incident underscores the critical need for robust input/output sanitization in AI-powered systems, especially in customer-facing applications. Rapid AI adoption in enterprises must be accompanied by rigorous security testing to mitigate risks like XSS and prompt injection attacks.

What was the most significant recommendation implemented to improve cybersecurity ?

Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Use enterprise management tools like Group Policy Preferences or SCCM, Remove the vulnerable file using PowerShell or Command Prompt, Monitor and limit the length/complexity of user prompts to mitigate injection risks., Educate developers and security teams on emerging AI-specific threats (e.g., prompt hacking, model manipulation)., Adopt secure coding practices for AI/ML applications, including context-aware filtering for dynamic content generation., Conduct regular security audits and penetration testing for AI systems, particularly those integrated with third-party models (e.g., GPT-4). and Implement strict input/output sanitization for AI chatbots to prevent XSS and prompt injection..

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident are TrustedSec and Cybernews.

Investigation Status

What is the current status of the most recent investigation ?

Current Status of Most Recent Investigation: The current status of the most recent investigation is Disclosed by Cybernews Researchers (No Further Updates).

Initial Access Broker

What was the most recent entry point used by an initial access broker ?

Most Recent Entry Point: The most recent entry point used by an initial access broker was an AI Chatbot ('Lena') via Malicious Prompt.

Post-Incident Analysis

What was the most significant root cause identified in post-incident analysis ?

Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Incorrect file permissions on MFGSTAT.zip, Lack of Input/Output Sanitization in AI ChatbotOver-reliance on Third-Party AI Model (GPT-4) Without Adequate Security ControlsInsufficient Security Testing for Prompt Injection Vulnerabilities.

What was the most significant corrective action taken based on post-incident analysis ?

Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Remove the vulnerable fileUse enterprise management tools for systematic removal.

cve

Latest Global CVEs (Not Company-Specific)

Description

A flaw has been found in wandb OpenUI up to 1.0. This affects the function create_share/get_share of the file backend/openui/server.py of the component HTMLAnnotator Component. Executing a manipulation of the argument ID can lead to HTML injection. The attack may be performed from remote. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:N/I:P/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was detected in QDOCS Smart School Management System up to 7.2. The impacted element is an unknown function of the file /admin/enquiry of the component Admission Enquiry Module. Performing a manipulation of the argument Note results in cross site scripting. The attack is possible to be carried out remotely.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:N/I:P/A:N
cvss3
Base: 3.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.1
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

The Ultimate Member plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.11.2. This is due to the '{usermeta:password_reset_link}' template tag being processed within post content via the '[um_loggedin]' shortcode, which generates a valid password reset token for the currently logged-in user viewing the page. This makes it possible for authenticated attackers, with Contributor-level access and above, to craft a malicious pending post that, when previewed by an Administrator, generates a password reset token for the Administrator and exfiltrates it to an attacker-controlled server, leading to full account takeover.

Risk Information
cvss3
Base: 8.0
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Description

LibJWT is a C JSON Web Token Library. Starting in version 3.0.0 and prior to version 3.3.0, the JWK parsing for RSA-PSS did not protect against a NULL value when expecting to parse JSON string values. A specially crafted JWK file could exploit this behavior by using integers in places where the code expected a string. This was fixed in v3.3.0. A workaround is available. Users importing keys through a JWK file should not do so from untrusted sources. Use the `jwk2key` tool to check for validity of a JWK file. Likewise, if possible, do not use JWK files with RSA-PSS keys.

Risk Information
cvss4
Base: 5.8
Severity: HIGH
CVSS:4.0/AV:A/AC:H/AT:P/PR:N/UI:A/VC:L/VI:L/VA:H/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Locutus brings stdlibs of other programming languages to JavaScript for educational purposes. Starting in version 2.0.39 and prior to version 3.0.25, a prototype pollution vulnerability exists in the `parse_str` function of the npm package locutus. An attacker can pollute `Object.prototype` by overriding `RegExp.prototype.test` and then passing a crafted query string to `parse_str`, bypassing the prototype pollution guard. This vulnerability stems from an incomplete fix for CVE-2026-25521. The CVE-2026-25521 patch replaced the `String.prototype.includes()`-based guard with a `RegExp.prototype.test()`-based guard. However, `RegExp.prototype.test` is itself a writable prototype method that can be overridden, making the new guard bypassable in the same way as the original — trading one hijackable built-in for another. Version 3.0.25 contains an updated fix.

Risk Information
cvss4
Base: 6.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=lenovo' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge