CVE-2019-6156

Description

In Lenovo systems, SMM BIOS Write Protection is used to prevent writes to SPI Flash. While this provides sufficient protection, an additional layer of protection is provided by SPI Protected Range Registers (PRx). Lenovo was notified that after resuming from S3 sleep mode in various versions of BIOS for Lenovo systems, the PRx is not set. This does not impact the SMM BIOS Write Protection, which keeps systems protected.

Remediation

Solution:

  • No action required. Lenovo has updated BIOS for systems in the product impact section to implement this secondary protection, PRx.

Category

3.3
CVSS
Severity: Low
CVSS 3.0 •
CVSS 2.0 •
EPSS 0.04%
Vendor Advisory lenovo.com
Affected: Lenovo BIOS
Published at:
Updated at:

References

Link Tags
https://support.lenovo.com/solutions/LEN-26332 patch vendor advisory

Frequently Asked Questions

What is the severity of CVE-2019-6156?
CVE-2019-6156 has been scored as a low severity vulnerability.
How to fix CVE-2019-6156?
To fix CVE-2019-6156: No action required. Lenovo has updated BIOS for systems in the product impact section to implement this secondary protection, PRx.
Is CVE-2019-6156 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2019-6156 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2019-6156?
CVE-2019-6156 affects Lenovo BIOS.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.