CVE-2020-8341

Description

In Lenovo systems, SMM BIOS Write Protection is used to prevent writes to SPI Flash. While this provides sufficient protection, an additional layer of protection is provided by SPI Protected Range Registers (PRx). After resuming from S3 sleep mode in various versions of BIOS for some Lenovo ThinkPad systems, the PRx is not set. This does not impact the SMM BIOS Write Protection, which keeps systems protected.

Remediation

Solution:

  • No action required. Lenovo has updated BIOS for systems in the product impact section to implement this secondary protection, PRx.
2.4
CVSS
Severity: Low
CVSS 3.1 •
CVSS 2.0 •
EPSS 0.06%
Vendor Advisory lenovo.com
Affected: Lenovo ThinkPad
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2020-8341?
CVE-2020-8341 has been scored as a low severity vulnerability.
How to fix CVE-2020-8341?
To fix CVE-2020-8341: No action required. Lenovo has updated BIOS for systems in the product impact section to implement this secondary protection, PRx.
Is CVE-2020-8341 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2020-8341 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2020-8341?
CVE-2020-8341 affects Lenovo ThinkPad.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.