cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-12673,https://securityvulnerability.io/vulnerability/CVE-2024-12673,Improper Privilege Vulnerability in Lenovo Vantage on SMB Notebooks,"An improper privilege vulnerability exists in the BIOS customization feature of Lenovo Vantage designed for SMB notebook devices, enabling a local attacker to enhance their privileges on the system. This issue compromises security on affected Lenovo devices, including specific models from the V Series, ThinkBook, and ThinkPad E Series, potentially allowing unauthorized users to execute sensitive actions that should be restricted.",Lenovo,Vantage,8.5,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-12T20:31:18.910Z,0 CVE-2024-45102,https://securityvulnerability.io/vulnerability/CVE-2024-45102,Privilege Escalation in Lenovo XClarity Administrator for SSO Integration,"A privilege escalation vulnerability allows validated LXCA users to unintentionally elevate their permissions within connected XCC instances while using LXCA as a Single Sign-On (SSO) provider. This flaw could enable unauthorized access to sensitive features, potentially compromising the security posture of the affected systems.",Lenovo,Xclarity Administrator,6.8,MEDIUM,0.0005000000237487257,false,,false,false,false,,false,false,false,,2025-01-14T22:15:00.000Z,0 CVE-2024-10254,https://securityvulnerability.io/vulnerability/CVE-2024-10254,"Buffer Overflow Vulnerability in Lenovo PC Manager, Browser, and App Store","A buffer overflow vulnerability has been identified in Lenovo PC Manager, Lenovo Browser, and Lenovo App Store. This flaw could potentially allow a local attacker to exploit the vulnerability, leading to system instability and crashes. Users are urged to stay informed about updates and patches to mitigate potential security risks associated with these affected products.",Lenovo,"Pc Manager,Browser,App Store",4.7,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-01-14T22:15:00.000Z,0 CVE-2024-10253,https://securityvulnerability.io/vulnerability/CVE-2024-10253,TOCTOU Vulnerability in Lenovo Software Products,"A potential Time-of-Check to Time-of-Use (TOCTOU) vulnerability has been identified in Lenovo's software products, including PC Manager, Lenovo Browser, and Lenovo App Store. This vulnerability could enable a local attacker to exploit the timing issue, potentially resulting in a system crash and disrupting normal operations. Users of these affected Lenovo products should be vigilant and consider applying relevant updates or patches to mitigate the risk.",Lenovo,"Pc Manager,Browser,App Store",4.7,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-01-14T22:15:00.000Z,125 CVE-2024-6001,https://securityvulnerability.io/vulnerability/CVE-2024-6001,Improper Certificate Validation Vulnerability in Lenovo LADM Products,"An improper certificate validation vulnerability has been identified in Lenovo's LADM product line, allowing potential network attackers to manipulate update requests to a remote server. This security flaw could lead to elevated privilege code execution, posing significant risks to the integrity and confidentiality of systems utilizing these products. Organizations using affected versions are advised to apply necessary updates and review security configurations to mitigate this vulnerability.",Lenovo,,8.1,HIGH,0.000910000002477318,false,,false,false,false,,,false,false,,2024-12-16T17:15:00.000Z,0 CVE-2024-4762,https://securityvulnerability.io/vulnerability/CVE-2024-4762,Improper Validation Vulnerability in Lenovo's LADM and LDCC Firmware Update Mechanism,"The vulnerability in Lenovo's LADM and LDCC firmware update mechanism arises from improper validation processes. This flaw could potentially enable a local attacker to exploit the system and escalate their privileges. Such vulnerabilities may lead to unauthorized access, compromising system integrity and exposing sensitive information. It is crucial for users to be aware of this issue and take appropriate security measures to safeguard their systems.",Lenovo,,7.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-12-16T17:15:00.000Z,0 CVE-2024-33582,https://securityvulnerability.io/vulnerability/CVE-2024-33582,Lenovo Service Framework Vulnerability Allows Local Attacker Execution with Elevated Privileges,"A vulnerability in Lenovo Service Framework has been identified which enables a DLL hijack scenario. This flaw permits a local attacker to execute arbitrary code with elevated privileges, potentially compromising system integrity and security. The risk associated with this vulnerability underscores the importance of implementing security measures and timely software updates. For more detailed information, users and administrators should refer to Lenovo's security advisories and ensure their systems are adequately protected.",Lenovo,Service Framework,7.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-10-11T15:17:45.232Z,0 CVE-2024-33581,https://securityvulnerability.io/vulnerability/CVE-2024-33581,Lenovo PC Manager AI Scenario Vulnerability,"A DLL hijack vulnerability exists in Lenovo PC Manager, specifically within the AI intelligent scenario module. This vulnerability can be exploited by local attackers to execute arbitrary code with elevated privileges on the affected systems. Such an exploit could potentially compromise sensitive data or enable unauthorized access to system resources.",Lenovo,Pc Manager Ai Intelligent Scenario,7.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-10-11T15:17:35.007Z,0 CVE-2024-33580,https://securityvulnerability.io/vulnerability/CVE-2024-33580,Lenovo Personal Cloud Hijack Vulnerability,"A DLL hijack vulnerability exists in Lenovo Personal Cloud that could be exploited by local attackers. This security issue allows unauthorized execution of code with elevated privileges, which poses substantial risks to user data and system operations. Attackers can leverage this vulnerability to manipulate affected systems, potentially leading to unauthorized access or data manipulation. It is essential for users of Lenovo Personal Cloud to remain vigilant and apply any available patches or updates to mitigate the threat.",Lenovo,Personal Cloud,7.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-10-11T15:17:03.670Z,0 CVE-2024-33579,https://securityvulnerability.io/vulnerability/CVE-2024-33579,DLL Hijack Vulnerability in Lenovo Baiying Could Allow Code Execution with Elevated Privileges,"A vulnerability exists in Lenovo's Baiying software due to improper handling of dynamic link libraries (DLLs). This security weakness may be exploited by local attackers who can manipulate DLLs, leading to unauthorized code execution with elevated privileges. It is essential for users to review and apply any available patches to mitigate this risk and enhance system security.",Lenovo,Baiying,7.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-10-11T15:16:54.792Z,0 CVE-2024-33578,https://securityvulnerability.io/vulnerability/CVE-2024-33578,Lenovo Leyun DLL Hijack Vulnerability Could Allow Local Attacker to Execute Code with Elevated Privileges,"A vulnerability has been identified in the Lenovo Leyun software that allows local attackers to perform DLL hijacking. This flaw can result in unauthorized code execution with elevated privileges, potentially compromising system integrity. It is crucial for users of Lenovo Leyun to apply the necessary security updates and follow best practices to mitigate potential exploitation.",Lenovo,Leyun,7.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-10-11T15:16:44.965Z,0 CVE-2024-9046,https://securityvulnerability.io/vulnerability/CVE-2024-9046,Lenovo stARstudio Hijack Vulnerability Could Allow Local Attacker to Execute Code with Elevated Privileges,"A vulnerability identified in Lenovo's stARstudio presents a significant risk due to a DLL hijacking flaw. This issue allows local attackers to execute arbitrary code with elevated privileges, potentially compromising system security and integrity. The vulnerability underscores the need for immediate updates to affected versions of stARstudio to mitigate risks associated with unauthorized code execution and protect sensitive information.",Lenovo,Starstudio,7.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-10-11T15:16:32.088Z,0 CVE-2024-4132,https://securityvulnerability.io/vulnerability/CVE-2024-4132,Lenovo Lock Screen Hijack Vulnerability Allows Local Attacker to Execute Code with Elevated Privileges,"A DLL hijack vulnerability exists in Lenovo Lock Screen, allowing local attackers to exploit the issue for executing arbitrary code with elevated privileges. By placing a malicious DLL in a location that the application accesses, an attacker can gain control over the affected product, potentially leading to unauthorized changes to system configurations or data breaches. This vulnerability underscores the importance of keeping security measures updated and adapting to emerging threats in the cybersecurity landscape.",Lenovo,Lock Screen,7.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-10-11T15:16:00.573Z,0 CVE-2024-4131,https://securityvulnerability.io/vulnerability/CVE-2024-4131,Lenovo Emulator Hijack Vulnerability Allows Local Attacker Execution with Elevated Privileges,"A DLL hijacking vulnerability in Lenovo Emulator poses significant risks, allowing local attackers to execute arbitrary code with heightened privileges. This security flaw can be exploited by malicious actors who have access to the vulnerable software environment, potentially leading to unauthorized actions on a compromised system. Users of affected versions are urged to implement mitigation strategies to safeguard their systems against potential exploitation.",Lenovo,Emulator,7.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-10-11T15:15:51.533Z,0 CVE-2024-4130,https://securityvulnerability.io/vulnerability/CVE-2024-4130,Lenovo App Store Hijack Vulnerability Allows Local Attacker Execution with Elevated Privileges,"A DLL hijack vulnerability has been identified in Lenovo App Store, potentially enabling local attackers to execute arbitrary code with elevated privileges. This issue poses significant risks to systems where the affected application is installed, allowing unauthorized access and manipulation of system resources. Ensuring the application is updated and following security best practices is essential to mitigate potential exploitation of this vulnerability.",Lenovo,App Store,7.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-10-11T15:15:41.059Z,0 CVE-2024-4089,https://securityvulnerability.io/vulnerability/CVE-2024-4089,Lenovo Super File Hijack Vulnerability Could Allow Local Attacker to Execute Code with Elevated Privileges,"A vulnerability exists in Lenovo Super File that allows a local attacker to exploit a DLL hijacking flaw. By placing a malicious DLL in a specific location, the attacker can manipulate the application into loading the malicious file instead of the legitimate one. This may result in the execution of arbitrary code with elevated privileges, posing significant risks to system integrity and user data. Users are strongly recommended to apply updates and security patches provided by Lenovo to mitigate this vulnerability and secure their systems.",Lenovo,Superfile,7.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-10-11T15:15:29.047Z,0 CVE-2024-5474,https://securityvulnerability.io/vulnerability/CVE-2024-5474,Information Disclosure Vulnerability in Lenovo's Dolby Vision Provisioning Software,"A significant information disclosure vulnerability was identified in Lenovo's Dolby Vision Provisioning software versions before 2.0.0.2. This flaw enables a local attacker to read sensitive files on the system during the installation process of the software, potentially leading to unauthorized access to critical data. Notably, the vulnerability does not affect previously installed versions of the product.",Lenovo,Dolby Vision Provisioning Software,5.5,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-10-11T15:15:12.643Z,0 CVE-2024-45105,https://securityvulnerability.io/vulnerability/CVE-2024-45105,Hidden Server Vulnerability Could Allow Local Attackers to Execute Arbitrary Code,An internal product security audit discovered a UEFI SMM (System Management Mode) callout vulnerability in some ThinkSystem servers that could allow a local attacker with elevated privileges to execute arbitrary code.,Lenovo,"Hx5530 Appliance (thinkagile) BiOS,Hx645 V3 Integrated System (thinkagile) BiOS,Hx665 V3 Certified Node (thinkagile) BiOS,St250 V3 (thinksystem) BiOS,Vx3331 Certified Node (thinkagile) BiOS,Hx1331 Certified Node (thinkagile) BiOS,Hx2330 Appliance (thinkagile) BiOS,Hx2331 Certified Node (thinkagile) BiOS,Hx3330 Appliance (thinkagile) BiOS,Hx3331 Certified Node (thinkagile) BiOS,Hx3331 Node SAP Hana (thinkagile) BiOS,Hx3375 Appliance (thinkagile) BiOS,Hx3376 Certified Node (thinkagile) BiOS,Hx5531 Certified Node (thinkagile) BiOS,Hx630 V3 Certified Node (thinkagile) BiOS,Hx630 V3 Integrated System (thinkagile) BiOS,Hx645 V3 Certified Node (thinkagile) BiOS,Hx650 V3 Certified Node (thinkagile) BiOS,Hx650 V3 Integrated System (thinkagile) BiOS,Hx665 V3 Integrated System (thinkagile) BiOS,Hx665 V3 Storage Certified Node (thinkagile) BiOS,Hx665 V3 Storage Integrated Node (thinkagile) BiOS,Hx7530 Appl For SAP Hana (thinkagile) BiOS,Hx7531 Certified Node (thinkagile) BiOS,Hx7531 Node SAP Hana (thinkagile) BiOS,Mx3330-f All-flash Appliance (thinkagile) BiOS,Mx3330-h Hybrid Appliance (thinkagile) BiOS,Mx3331-f All-flash Certified Node (thinkagile) BiOS,Mx3331-h Hybrid Certified Node (thinkagile) BiOS,Mx3530 F All Flash Appliance (thinkagile) BiOS,Mx3530-h Hybrid Appliance (thinkagile) BiOS,Mx3531 H Hybrid Certified Node (thinkagile) BiOS,Mx3531-f All-flash Certified Node (thinkagile) BiOS,Mx630 V3 Certified Node (thinkagile) BiOS,Mx630 V3 Integrated System (thinkagile) BiOS,Mx650 V3 Certified Node (thinkagile) BiOS,Mx650 V3 Integrated System (thinkagile) BiOS,Sd530 V3 (thinksystem) BiOS,Sd550 V3 (thinksystem) BiOS,Sd630 V2 (thinksystem) BiOS,Sd650 V2 (thinksystem) BiOS,Sd650 V3 (thinksystem) BiOS,Sd650-n V2 (thinksystem) BiOS,Sd665 V3 (thinksystem) BiOS,Se350 V2 (thinkedge) BiOS,Se360 V2 (thinkedge) BiOS,Se450 (thinkedge) BiOS,Se455 V3 (thinkedge) BiOS,Sn550 V2 (thinksystem) BiOS,Sr250 V2 (thinksystem) BiOS,Sr250 V3 (thinksystem) BiOS,Sr258 V2 (thinksystem) BiOS,Sr258 V3 (thinksystem) BiOS,Sr630 V2 (thinksystem) BiOS,Sr630 V3 (thinksystem) BiOS,Sr635 V3 (thinksystem) BiOS,Sr645 (thinksystem) BiOS,Sr645 V3 (thinksystem) BiOS,Sr650 V2 (thinksystem) BiOS,Sr650 V3 (thinksystem) BiOS,Sr655 V3 (thinksystem) BiOS,Sr665 (thinksystem) BiOS,Sr665 V3 (thinksystem) BiOS,Sr670 V2 (thinksystem) BiOS,Sr675 V3 (thinksystem) BiOS,Sr850 V2 (thinksystem) BiOS,Sr850 V3 (thinksystem) BiOS,Sr860 V2 (thinksystem) BiOS,Sr860 V3 (thinksystem) BiOS,Sr950 V3 (thinksystem) BiOS,St250 V2 (thinksystem) BiOS,St258 V2 (thinksystem) BiOS,St258 V3 (thinksystem) BiOS,St650 V2 (thinksystem) BiOS,St650 V3 (thinksystem) BiOS,St658 V2 (thinksystem) BiOS,St658 V3 (thinksystem) BiOS,Vx2330 Appliance (thinkagile) BiOS,Vx3330 Appliance (thinkagile) BiOS,Vx3530-g Appliance (thinkagile) BiOS,Vx5530 Appliance (thinkagile) BiOS,Vx630 V3 Certified Node (thinkagile) BiOS,Vx635 V3 Certified Node (thinkagile) BiOS,Vx635 V3 Integrated System (thinkagile) BiOS,Vx645 V3 Certified Node (thinkagile) BiOS,Vx645 V3 Integrated System (thinkagile) BiOS,Vx650 V3 Certified Node (thinkagile) BiOS,Vx650 V3 Dpu Certified Node (thinkagile) BiOS,Vx650 V3 Dpu Integrated System (thinkagile) BiOS,Vx650 V3 Dpu SAP Hana Certified Node (thinkagile) BiOS,Vx650 V3 Integrated System (thinkagile) BiOS,Vx650 V3 SAP Hana Certified Node (thinkagile) BiOS,Vx655 V3 Certified Node (thinkagile) BiOS,Vx655 V3 Integrated System (thinkagile) BiOS,Vx665 V3 Certified Node (thinkagile) BiOS,Vx665 V3 Integrated System (thinkagile) BiOS,Vx7330 Appliance (thinkagile) BiOS,Vx7530 Appliance (thinkagile) BiOS,Vx7531 Certified Node (thinkagile) BiOS",6.7,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-09-13T17:29:08.267Z,0 CVE-2024-45104,https://securityvulnerability.io/vulnerability/CVE-2024-45104,LXCA Managed Device Vulnerability,"A valid, authenticated LXCA user without sufficient privileges may be able to use the device identifier to modify an LXCA managed device through a specially crafted web API call.",Lenovo,Xclarity Administrator,6.5,MEDIUM,0.0004600000102072954,false,,false,false,false,,,false,false,,2024-09-13T17:28:55.910Z,0 CVE-2024-45103,https://securityvulnerability.io/vulnerability/CVE-2024-45103,Unmanaging LXCA Managed Devices through Web Interface,"A valid, authenticated LXCA user may be able to unmanage an LXCA managed device in through the LXCA web interface without sufficient privileges.",Lenovo,Xclarity Administrator,4.3,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2024-09-13T17:28:26.004Z,0 CVE-2024-45101,https://securityvulnerability.io/vulnerability/CVE-2024-45101,Privilege Escalation Vulnerability in LXCA with SSO Enabled,"A privilege escalation vulnerability was discovered when Single Sign On (SSO) is enabled that could allow an attacker to intercept a valid, authenticated LXCA user’s XCC session if they can convince the user to click on a specially crafted URL.",Lenovo,Xclarity Administrator,6.8,MEDIUM,0.000910000002477318,false,,false,false,false,,,false,false,,2024-09-13T17:27:56.092Z,0 CVE-2024-8281,https://securityvulnerability.io/vulnerability/CVE-2024-8281,Command Injection Vulnerability in XCC SSH Captive Shell,"An input validation weakness has been identified in Lenovo's XCC that could potentially allow authenticated users with elevated privileges to execute command injection attacks through carefully constructed command line inputs in the XCC SSH captive shell. This vulnerability poses a significant risk to the integrity and security of affected systems, requiring immediate remediation efforts to protect sensitive environments and data from exploitation.",Lenovo,"Hx5530 Appliance (thinkagile) Xcc,Hx7530 Appliance (thinkagile) Xcc,St250 V3 (thinksystem) Xcc,Vx3331 Certified Node (thinkagile) Xcc,Hx Enclosure Certified Node (thinkagile) Xcc,Hx1021 Edge Certified Node 3yr (thinkagile) Xcc,Hx1320 Appliance (thinkagile) Xcc,Hx1321 Certified Node (thinkagile) Xcc,Hx1331 Certified Node (thinkagile) Xcc,Hx1520-r Appliance (thinkagile) Xcc,Hx1521-r Certified Node (thinkagile) Xcc,Hx2320-e Appliance (thinkagile) Xcc,Hx2321 Certified Node (thinkagile) Xcc,Hx2330 Appliance (thinkagile) Xcc,Hx2331 Certified Node (thinkagile) Xcc,Hx2720-e Appliance (thinkagile) Xcc,Hx3320 Appliance (thinkagile) Xcc,Hx3321 Certified Node (thinkagile) Xcc,Hx3330 Appliance (thinkagile) Xcc,Hx3331 Certified Node (thinkagile) Xcc,Hx3331 Node SAP Hana (thinkagile) Xcc,Hx3375 Appliance (thinkagile) Xcc,Hx3376 Certified Node (thinkagile) Xcc,Hx3520-g Appliance (thinkagile) Xcc,Hx3521-g Certified Node (thinkagile) Xcc,Hx3720 Appliance (thinkagile) Xcc,Hx3721 Certified Node (thinkagile) Xcc,Hx5520 Appliance (thinkagile) Xcc,Hx5520-c Appliance (thinkagile) Xcc,Hx5521 Certified Node (thinkagile) Xcc,Hx5521-c Certified Node (thinkagile) Xcc,Hx5531 Certified Node (thinkagile) Xcc,Hx7520 Appliance (thinkagile) Xcc,Hx7521 Certified Node (thinkagile) Xcc,Hx7530 Appl For SAP Hana (thinkagile) Xcc,Hx7531 Certified Node (thinkagile) Xcc,Hx7531 Node SAP Hana (thinkagile) Xcc,Hx7820 Appliance (thinkagile) Xcc,Hx7821 Certified Node (thinkagile) Xcc,Mx Edge Appliance - Mx1020 (thinkagile) Xcc,Mx3330-f All-flash Appliance (thinkagile) Xcc,Mx3330-h Hybrid Appliance (thinkagile) Xcc,Mx3331-f All-flash Certified Node (thinkagile) Xcc,Mx3331-h Hybrid Certified Node (thinkagile) Xcc,Mx3530 F All Flash Appliance (thinkagile) Xcc,Mx3530-h Hybrid Appliance (thinkagile) Xcc,Mx3531 H Hybrid Certified Node (thinkagile) Xcc,Mx3531-f All-flash Certified Node (thinkagile) Xcc,P920 Rack Workstation (thinkstation) Xcc,Sd530 (thinksystem) Xcc,Sd530 V3 (thinksystem) Xcc,Sd550 V3 (thinksystem) Xcc,Sd630 V2 (thinksystem) Xcc,Sd650 Dwc Dual Node Tray (thinksystem) Xcc,Sd650 V2 (thinksystem) Xcc,Sd650 V3 (thinksystem) Xcc,Sd650-n V2 (thinksystem) Xcc,Sd665 V3 (thinksystem) Xcc,Se350 (thinksystem) Xcc,Se350 V2 (thinkedge) Xcc,Se360 V2 (thinkedge) Xcc,Se450 (thinkedge) Xcc,Se455 V3 (thinkedge) Xcc,Sn550 (thinksystem) Xcc,Sn550 V2 (thinksystem) Xcc,Sn850 (thinksystem) Xcc,Sr150 (thinksystem) Xcc,Sr158 (thinksystem) Xcc,Sr250 (thinksystem) Xcc,Sr250 V2 (thinksystem) Xcc,Sr250 V3 (thinksystem) Xcc,Sr258 (thinksystem) Xcc,Sr258 V2 (thinksystem) Xcc,Sr258 V3 (thinksystem) Xcc,Sr530 (thinksystem) Xcc,Sr550 (thinksystem) Xcc,Sr570 (thinksystem) Xcc,Sr590 (thinksystem) Xcc,Sr630 (thinksystem) Xcc,Sr630 V2 (thinksystem) Xcc,Sr630 V3 (thinksystem) Xcc,Sr635 V3 (thinksystem) Xcc,Sr645 (thinksystem) Xcc,Sr645 V3 (thinksystem) Xcc,Sr650 (thinksystem) Xcc,Sr650 V2 (thinksystem) Xcc,Sr650 V3 (thinksystem) Xcc,Sr655 V3 (thinksystem) Xcc,Sr665 (thinksystem) Xcc,Sr665 V3 (thinksystem) Xcc,Sr670 (thinksystem) Xcc,Sr670 V2 (thinksystem) Xcc,Sr675 V3 (thinksystem) Xcc,Sr850 (thinksystem) Xcc,Sr850 V2 (thinksystem) Xcc,Sr850 V3 (thinksystem) Xcc,Sr850p (thinksystem) Xcc,Sr860 (thinksystem) Xcc,Sr860 V2 (thinksystem) Xcc,Sr860 V3 (thinksystem) Xcc,Sr950 (thinksystem) Xcc,Sr950 V3 (thinksystem) Xcc,St250 (thinksystem) Xcc,St250 V2 (thinksystem) Xcc,St258 (thinksystem) Xcc,St258 V2 (thinksystem) Xcc,St258 V3 (thinksystem) Xcc,St550 (thinksystem) Xcc,St650 V2 (thinksystem) Xcc,St650 V3 (thinksystem) Xcc,St658 V2 (thinksystem) Xcc,St658 V3 (thinksystem) Xcc,Thinkagile Mx1021 On Se350 Xcc,Vx 1se Certified Node (thinkagile) Xcc,Vx 2u4n Certified Node (thinkagile) Xcc,Vx 4u Certified Node (thinkagile) Xcc,Vx1320 (thinkagile) Xcc,Vx2320 (thinkagile) Xcc,Vx2330 Appliance (thinkagile) Xcc,Vx3320 (thinkagile) Xcc,Vx3330 Appliance (thinkagile) Xcc,Vx3520-g (thinkagile) Xcc,Vx3530-g Appliance (thinkagile) Xcc,Vx3720 (thinkagile) Xcc,Vx5520 (thinkagile) Xcc,Vx5530 Appliance (thinkagile) Xcc,Vx635 V3 Integrated System (thinkagile) Xcc,Vx645 V3 Certified Node (thinkagile) Xcc,Vx645 V3 Integrated System (thinkagile) Xcc,Vx655 V3 Certified Node (thinkagile) Xcc,Vx655 V3 Integrated System (thinkagile) Xcc,Vx665 V3 Certified Node (thinkagile) Xcc,Vx665 V3 Integrated System (thinkagile) Xcc,Vx7320 N (thinkagile) Xcc,Vx7330 Appliance (thinkagile) Xcc,Vx7520 (thinkagile) Xcc,Vx7520 N (thinkagile) Xcc,Vx7530 Appliance (thinkagile) Xcc,Vx7531 Certified Node (thinkagile) Xcc,Vx7820 (thinkagile) Xcc",7.2,HIGH,0.0005200000014156103,false,,false,false,false,,,false,false,,2024-09-13T17:27:48.442Z,0 CVE-2024-8280,https://securityvulnerability.io/vulnerability/CVE-2024-8280,XCC Input Validation Weakness Could Lead to Command Injection or Denial of Service,"An input validation weakness has been identified in Lenovo's XCC, which may allow an authenticated user with elevated privileges to exploit this vulnerability. By using a specially crafted file, it is possible to perform command injection attacks, potentially leading to unauthorized command execution. Additionally, this vulnerability could result in a recoverable denial of service, impacting the overall stability and performance of affected systems. Users of XCC are advised to review their configurations and apply necessary mitigations as outlined in Lenovo's security advisories.",Lenovo,"Hx5530 Appliance (thinkagile) Xcc,Hx7530 Appliance (thinkagile) Xcc,St250 V3 (thinksystem) Xcc,Vx3331 Certified Node (thinkagile) Xcc,Hx Enclosure Certified Node (thinkagile) Xcc,Hx1021 Edge Certified Node 3yr (thinkagile) Xcc,Hx1320 Appliance (thinkagile) Xcc,Hx1321 Certified Node (thinkagile) Xcc,Hx1331 Certified Node (thinkagile) Xcc,Hx1520-r Appliance (thinkagile) Xcc,Hx1521-r Certified Node (thinkagile) Xcc,Hx2320-e Appliance (thinkagile) Xcc,Hx2321 Certified Node (thinkagile) Xcc,Hx2330 Appliance (thinkagile) Xcc,Hx2331 Certified Node (thinkagile) Xcc,Hx2720-e Appliance (thinkagile) Xcc,Hx3320 Appliance (thinkagile) Xcc,Hx3321 Certified Node (thinkagile) Xcc,Hx3330 Appliance (thinkagile) Xcc,Hx3331 Certified Node (thinkagile) Xcc,Hx3331 Node SAP Hana (thinkagile) Xcc,Hx3375 Appliance (thinkagile) Xcc,Hx3376 Certified Node (thinkagile) Xcc,Hx3520-g Appliance (thinkagile) Xcc,Hx3521-g Certified Node (thinkagile) Xcc,Hx3720 Appliance (thinkagile) Xcc,Hx3721 Certified Node (thinkagile) Xcc,Hx5520 Appliance (thinkagile) Xcc,Hx5520-c Appliance (thinkagile) Xcc,Hx5521 Certified Node (thinkagile) Xcc,Hx5521-c Certified Node (thinkagile) Xcc,Hx5531 Certified Node (thinkagile) Xcc,Hx7520 Appliance (thinkagile) Xcc,Hx7521 Certified Node (thinkagile) Xcc,Hx7530 Appl For SAP Hana (thinkagile) Xcc,Hx7531 Certified Node (thinkagile) Xcc,Hx7531 Node SAP Hana (thinkagile) Xcc,Hx7820 Appliance (thinkagile) Xcc,Hx7821 Certified Node (thinkagile) Xcc,Mx Edge Appliance - Mx1020 (thinkagile) Xcc,Mx3330-f All-flash Appliance (thinkagile) Xcc,Mx3330-h Hybrid Appliance (thinkagile) Xcc,Mx3331-f All-flash Certified Node (thinkagile) Xcc,Mx3331-h Hybrid Certified Node (thinkagile) Xcc,Mx3530 F All Flash Appliance (thinkagile) Xcc,Mx3530-h Hybrid Appliance (thinkagile) Xcc,Mx3531 H Hybrid Certified Node (thinkagile) Xcc,Mx3531-f All-flash Certified Node (thinkagile) Xcc,P920 Rack Workstation (thinkstation) Xcc,Sd530 (thinksystem) Xcc,Sd530 V3 (thinksystem) Xcc,Sd550 V3 (thinksystem) Xcc,Sd630 V2 (thinksystem) Xcc,Sd650 Dwc Dual Node Tray (thinksystem) Xcc,Sd650 V2 (thinksystem) Xcc,Sd650 V3 (thinksystem) Xcc,Sd650-n V2 (thinksystem) Xcc,Sd665 V3 (thinksystem) Xcc,Se350 (thinksystem) Xcc,Se350 V2 (thinkedge) Xcc,Se360 V2 (thinkedge) Xcc,Se450 (thinkedge) Xcc,Se455 V3 (thinkedge) Xcc,Sn550 (thinksystem) Xcc,Sn550 V2 (thinksystem) Xcc,Sn850 (thinksystem) Xcc,Sr150 (thinksystem) Xcc,Sr158 (thinksystem) Xcc,Sr250 (thinksystem) Xcc,Sr250 V2 (thinksystem) Xcc,Sr250 V3 (thinksystem) Xcc,Sr258 (thinksystem) Xcc,Sr258 V2 (thinksystem) Xcc,Sr258 V3 (thinksystem) Xcc,Sr530 (thinksystem) Xcc,Sr550 (thinksystem) Xcc,Sr570 (thinksystem) Xcc,Sr590 (thinksystem) Xcc,Sr630 (thinksystem) Xcc,Sr630 V2 (thinksystem) Xcc,Sr630 V3 (thinksystem) Xcc,Sr635 V3 (thinksystem) Xcc,Sr645 (thinksystem) Xcc,Sr645 V3 (thinksystem) Xcc,Sr650 (thinksystem) Xcc,Sr650 V2 (thinksystem) Xcc,Sr650 V3 (thinksystem) Xcc,Sr655 V3 (thinksystem) Xcc,Sr665 (thinksystem) Xcc,Sr665 V3 (thinksystem) Xcc,Sr670 (thinksystem) Xcc,Sr670 V2 (thinksystem) Xcc,Sr675 V3 (thinksystem) Xcc,Sr850 (thinksystem) Xcc,Sr850 V2 (thinksystem) Xcc,Sr850 V3 (thinksystem) Xcc,Sr850p (thinksystem) Xcc,Sr860 (thinksystem) Xcc,Sr860 V2 (thinksystem) Xcc,Sr860 V3 (thinksystem) Xcc,Sr950 (thinksystem) Xcc,Sr950 V3 (thinksystem) Xcc,St250 (thinksystem) Xcc,St250 V2 (thinksystem) Xcc,St258 (thinksystem) Xcc,St258 V2 (thinksystem) Xcc,St258 V3 (thinksystem) Xcc,St550 (thinksystem) Xcc,St650 V2 (thinksystem) Xcc,St650 V3 (thinksystem) Xcc,St658 V2 (thinksystem) Xcc,St658 V3 (thinksystem) Xcc,Thinkagile Mx1021 On Se350 Xcc,Vx 1se Certified Node (thinkagile) Xcc,Vx 2u4n Certified Node (thinkagile) Xcc,Vx 4u Certified Node (thinkagile) Xcc,Vx1320 (thinkagile) Xcc,Vx2320 (thinkagile) Xcc,Vx2330 Appliance (thinkagile) Xcc,Vx3320 (thinkagile) Xcc,Vx3330 Appliance (thinkagile) Xcc,Vx3520-g (thinkagile) Xcc,Vx3530-g Appliance (thinkagile) Xcc,Vx3720 (thinkagile) Xcc,Vx5520 (thinkagile) Xcc,Vx5530 Appliance (thinkagile) Xcc,Vx635 V3 Integrated System (thinkagile) Xcc,Vx645 V3 Certified Node (thinkagile) Xcc,Vx645 V3 Integrated System (thinkagile) Xcc,Vx655 V3 Certified Node (thinkagile) Xcc,Vx655 V3 Integrated System (thinkagile) Xcc,Vx665 V3 Certified Node (thinkagile) Xcc,Vx665 V3 Integrated System (thinkagile) Xcc,Vx7320 N (thinkagile) Xcc,Vx7330 Appliance (thinkagile) Xcc,Vx7520 (thinkagile) Xcc,Vx7520 N (thinkagile) Xcc,Vx7530 Appliance (thinkagile) Xcc,Vx7531 Certified Node (thinkagile) Xcc,Vx7820 (thinkagile) Xcc",7.2,HIGH,0.0005200000014156103,false,,false,false,false,,,false,false,,2024-09-13T17:27:39.022Z,0 CVE-2024-8279,https://securityvulnerability.io/vulnerability/CVE-2024-8279,Privilege Escalation Vulnerability in XCC Allows Command Injection via File Uploads,"A vulnerability in Lenovo's XCC product allows authenticated users with elevated privileges to exploit a privilege escalation flaw. This vulnerability enables attackers to perform command injection through specially crafted file uploads. Ensuring the security of XCC is crucial, as successful exploitation could lead to unauthorized access and control over the system.",Lenovo,"Hx5530 Appliance (thinkagile) Xcc,Hx7530 Appliance (thinkagile) Xcc,St250 V3 (thinksystem) Xcc,Vx3331 Certified Node (thinkagile) Xcc,Hx Enclosure Certified Node (thinkagile) Xcc,Hx1021 Edge Certified Node 3yr (thinkagile) Xcc,Hx1320 Appliance (thinkagile) Xcc,Hx1321 Certified Node (thinkagile) Xcc,Hx1331 Certified Node (thinkagile) Xcc,Hx1520-r Appliance (thinkagile) Xcc,Hx1521-r Certified Node (thinkagile) Xcc,Hx2320-e Appliance (thinkagile) Xcc,Hx2321 Certified Node (thinkagile) Xcc,Hx2330 Appliance (thinkagile) Xcc,Hx2331 Certified Node (thinkagile) Xcc,Hx2720-e Appliance (thinkagile) Xcc,Hx3320 Appliance (thinkagile) Xcc,Hx3321 Certified Node (thinkagile) Xcc,Hx3330 Appliance (thinkagile) Xcc,Hx3331 Certified Node (thinkagile) Xcc,Hx3331 Node SAP Hana (thinkagile) Xcc,Hx3375 Appliance (thinkagile) Xcc,Hx3376 Certified Node (thinkagile) Xcc,Hx3520-g Appliance (thinkagile) Xcc,Hx3521-g Certified Node (thinkagile) Xcc,Hx3720 Appliance (thinkagile) Xcc,Hx3721 Certified Node (thinkagile) Xcc,Hx5520 Appliance (thinkagile) Xcc,Hx5520-c Appliance (thinkagile) Xcc,Hx5521 Certified Node (thinkagile) Xcc,Hx5521-c Certified Node (thinkagile) Xcc,Hx5531 Certified Node (thinkagile) Xcc,Hx7520 Appliance (thinkagile) Xcc,Hx7521 Certified Node (thinkagile) Xcc,Hx7530 Appl For SAP Hana (thinkagile) Xcc,Hx7531 Certified Node (thinkagile) Xcc,Hx7531 Node SAP Hana (thinkagile) Xcc,Hx7820 Appliance (thinkagile) Xcc,Hx7821 Certified Node (thinkagile) Xcc,Mx Edge Appliance - Mx1020 (thinkagile) Xcc,Mx3330-f All-flash Appliance (thinkagile) Xcc,Mx3330-h Hybrid Appliance (thinkagile) Xcc,Mx3331-f All-flash Certified Node (thinkagile) Xcc,Mx3331-h Hybrid Certified Node (thinkagile) Xcc,Mx3530 F All Flash Appliance (thinkagile) Xcc,Mx3530-h Hybrid Appliance (thinkagile) Xcc,Mx3531 H Hybrid Certified Node (thinkagile) Xcc,Mx3531-f All-flash Certified Node (thinkagile) Xcc,P920 Rack Workstation (thinkstation) Xcc,Sd530 (thinksystem) Xcc,Sd530 V3 (thinksystem) Xcc,Sd550 V3 (thinksystem) Xcc,Sd630 V2 (thinksystem) Xcc,Sd650 Dwc Dual Node Tray (thinksystem) Xcc,Sd650 V2 (thinksystem) Xcc,Sd650 V3 (thinksystem) Xcc,Sd650-n V2 (thinksystem) Xcc,Sd665 V3 (thinksystem) Xcc,Se350 (thinksystem) Xcc,Se350 V2 (thinkedge) Xcc,Se360 V2 (thinkedge) Xcc,Se450 (thinkedge) Xcc,Se455 V3 (thinkedge) Xcc,Sn550 (thinksystem) Xcc,Sn550 V2 (thinksystem) Xcc,Sn850 (thinksystem) Xcc,Sr150 (thinksystem) Xcc,Sr158 (thinksystem) Xcc,Sr250 (thinksystem) Xcc,Sr250 V2 (thinksystem) Xcc,Sr250 V3 (thinksystem) Xcc,Sr258 (thinksystem) Xcc,Sr258 V2 (thinksystem) Xcc,Sr258 V3 (thinksystem) Xcc,Sr530 (thinksystem) Xcc,Sr550 (thinksystem) Xcc,Sr570 (thinksystem) Xcc,Sr590 (thinksystem) Xcc,Sr630 (thinksystem) Xcc,Sr630 V2 (thinksystem) Xcc,Sr630 V3 (thinksystem) Xcc,Sr635 V3 (thinksystem) Xcc,Sr645 (thinksystem) Xcc,Sr645 V3 (thinksystem) Xcc,Sr650 (thinksystem) Xcc,Sr650 V2 (thinksystem) Xcc,Sr650 V3 (thinksystem) Xcc,Sr655 V3 (thinksystem) Xcc,Sr665 (thinksystem) Xcc,Sr665 V3 (thinksystem) Xcc,Sr670 (thinksystem) Xcc,Sr670 V2 (thinksystem) Xcc,Sr675 V3 (thinksystem) Xcc,Sr850 (thinksystem) Xcc,Sr850 V2 (thinksystem) Xcc,Sr850 V3 (thinksystem) Xcc,Sr850p (thinksystem) Xcc,Sr860 (thinksystem) Xcc,Sr860 V2 (thinksystem) Xcc,Sr860 V3 (thinksystem) Xcc,Sr950 (thinksystem) Xcc,Sr950 V3 (thinksystem) Xcc,St250 (thinksystem) Xcc,St250 V2 (thinksystem) Xcc,St258 (thinksystem) Xcc,St258 V2 (thinksystem) Xcc,St258 V3 (thinksystem) Xcc,St550 (thinksystem) Xcc,St650 V2 (thinksystem) Xcc,St650 V3 (thinksystem) Xcc,St658 V2 (thinksystem) Xcc,St658 V3 (thinksystem) Xcc,Thinkagile Mx1021 On Se350 Xcc,Vx 1se Certified Node (thinkagile) Xcc,Vx 2u4n Certified Node (thinkagile) Xcc,Vx 4u Certified Node (thinkagile) Xcc,Vx1320 (thinkagile) Xcc,Vx2320 (thinkagile) Xcc,Vx2330 Appliance (thinkagile) Xcc,Vx3320 (thinkagile) Xcc,Vx3330 Appliance (thinkagile) Xcc,Vx3520-g (thinkagile) Xcc,Vx3530-g Appliance (thinkagile) Xcc,Vx3720 (thinkagile) Xcc,Vx5520 (thinkagile) Xcc,Vx5530 Appliance (thinkagile) Xcc,Vx635 V3 Integrated System (thinkagile) Xcc,Vx645 V3 Certified Node (thinkagile) Xcc,Vx645 V3 Integrated System (thinkagile) Xcc,Vx655 V3 Certified Node (thinkagile) Xcc,Vx655 V3 Integrated System (thinkagile) Xcc,Vx665 V3 Certified Node (thinkagile) Xcc,Vx665 V3 Integrated System (thinkagile) Xcc,Vx7320 N (thinkagile) Xcc,Vx7330 Appliance (thinkagile) Xcc,Vx7520 (thinkagile) Xcc,Vx7520 N (thinkagile) Xcc,Vx7530 Appliance (thinkagile) Xcc,Vx7531 Certified Node (thinkagile) Xcc,Vx7820 (thinkagile) Xcc",7.2,HIGH,0.0005200000014156103,false,,false,false,false,,,false,false,,2024-09-13T17:27:30.967Z,0 CVE-2024-8278,https://securityvulnerability.io/vulnerability/CVE-2024-8278,Possible Command Injection Vulnerability in XCC IPMI,"A privilege escalation vulnerability has been identified in Lenovo's XCC product, allowing authenticated users with elevated privileges to execute command injection. This security flaw is exploited through specially crafted IPMI commands, potentially compromising system integrity and confidentiality. Organizations using affected versions of XCC are advised to review their security measures and apply any available patches or updates to mitigate the risks associated with this vulnerability.",Lenovo,"Hx5530 Appliance (thinkagile) Xcc,Hx7530 Appliance (thinkagile) Xcc,St250 V3 (thinksystem) Xcc,Vx3331 Certified Node (thinkagile) Xcc,Hx Enclosure Certified Node (thinkagile) Xcc,Hx1021 Edge Certified Node 3yr (thinkagile) Xcc,Hx1320 Appliance (thinkagile) Xcc,Hx1321 Certified Node (thinkagile) Xcc,Hx1331 Certified Node (thinkagile) Xcc,Hx1520-r Appliance (thinkagile) Xcc,Hx1521-r Certified Node (thinkagile) Xcc,Hx2320-e Appliance (thinkagile) Xcc,Hx2321 Certified Node (thinkagile) Xcc,Hx2330 Appliance (thinkagile) Xcc,Hx2331 Certified Node (thinkagile) Xcc,Hx2720-e Appliance (thinkagile) Xcc,Hx3320 Appliance (thinkagile) Xcc,Hx3321 Certified Node (thinkagile) Xcc,Hx3330 Appliance (thinkagile) Xcc,Hx3331 Certified Node (thinkagile) Xcc,Hx3331 Node SAP Hana (thinkagile) Xcc,Hx3375 Appliance (thinkagile) Xcc,Hx3376 Certified Node (thinkagile) Xcc,Hx3520-g Appliance (thinkagile) Xcc,Hx3521-g Certified Node (thinkagile) Xcc,Hx3720 Appliance (thinkagile) Xcc,Hx3721 Certified Node (thinkagile) Xcc,Hx5520 Appliance (thinkagile) Xcc,Hx5520-c Appliance (thinkagile) Xcc,Hx5521 Certified Node (thinkagile) Xcc,Hx5521-c Certified Node (thinkagile) Xcc,Hx5531 Certified Node (thinkagile) Xcc,Hx7520 Appliance (thinkagile) Xcc,Hx7521 Certified Node (thinkagile) Xcc,Hx7530 Appl For SAP Hana (thinkagile) Xcc,Hx7531 Certified Node (thinkagile) Xcc,Hx7531 Node SAP Hana (thinkagile) Xcc,Hx7820 Appliance (thinkagile) Xcc,Hx7821 Certified Node (thinkagile) Xcc,Mx Edge Appliance - Mx1020 (thinkagile) Xcc,Mx3330-f All-flash Appliance (thinkagile) Xcc,Mx3330-h Hybrid Appliance (thinkagile) Xcc,Mx3331-f All-flash Certified Node (thinkagile) Xcc,Mx3331-h Hybrid Certified Node (thinkagile) Xcc,Mx3530 F All Flash Appliance (thinkagile) Xcc,Mx3530-h Hybrid Appliance (thinkagile) Xcc,Mx3531 H Hybrid Certified Node (thinkagile) Xcc,Mx3531-f All-flash Certified Node (thinkagile) Xcc,P920 Rack Workstation (thinkstation) Xcc,Sd530 (thinksystem) Xcc,Sd530 V3 (thinksystem) Xcc,Sd550 V3 (thinksystem) Xcc,Sd630 V2 (thinksystem) Xcc,Sd650 Dwc Dual Node Tray (thinksystem) Xcc,Sd650 V2 (thinksystem) Xcc,Sd650 V3 (thinksystem) Xcc,Sd650-n V2 (thinksystem) Xcc,Sd665 V3 (thinksystem) Xcc,Se350 (thinksystem) Xcc,Se350 V2 (thinkedge) Xcc,Se360 V2 (thinkedge) Xcc,Se450 (thinkedge) Xcc,Se455 V3 (thinkedge) Xcc,Sn550 (thinksystem) Xcc,Sn550 V2 (thinksystem) Xcc,Sn850 (thinksystem) Xcc,Sr150 (thinksystem) Xcc,Sr158 (thinksystem) Xcc,Sr250 (thinksystem) Xcc,Sr250 V2 (thinksystem) Xcc,Sr250 V3 (thinksystem) Xcc,Sr258 (thinksystem) Xcc,Sr258 V2 (thinksystem) Xcc,Sr258 V3 (thinksystem) Xcc,Sr530 (thinksystem) Xcc,Sr550 (thinksystem) Xcc,Sr570 (thinksystem) Xcc,Sr590 (thinksystem) Xcc,Sr630 (thinksystem) Xcc,Sr630 V2 (thinksystem) Xcc,Sr630 V3 (thinksystem) Xcc,Sr635 V3 (thinksystem) Xcc,Sr645 (thinksystem) Xcc,Sr645 V3 (thinksystem) Xcc,Sr650 (thinksystem) Xcc,Sr650 V2 (thinksystem) Xcc,Sr650 V3 (thinksystem) Xcc,Sr655 V3 (thinksystem) Xcc,Sr665 (thinksystem) Xcc,Sr665 V3 (thinksystem) Xcc,Sr670 (thinksystem) Xcc,Sr670 V2 (thinksystem) Xcc,Sr675 V3 (thinksystem) Xcc,Sr850 (thinksystem) Xcc,Sr850 V2 (thinksystem) Xcc,Sr850 V3 (thinksystem) Xcc,Sr850p (thinksystem) Xcc,Sr860 (thinksystem) Xcc,Sr860 V2 (thinksystem) Xcc,Sr860 V3 (thinksystem) Xcc,Sr950 (thinksystem) Xcc,Sr950 V3 (thinksystem) Xcc,St250 (thinksystem) Xcc,St250 V2 (thinksystem) Xcc,St258 (thinksystem) Xcc,St258 V2 (thinksystem) Xcc,St258 V3 (thinksystem) Xcc,St550 (thinksystem) Xcc,St650 V2 (thinksystem) Xcc,St650 V3 (thinksystem) Xcc,St658 V2 (thinksystem) Xcc,St658 V3 (thinksystem) Xcc,Thinkagile Mx1021 On Se350 Xcc,Vx 1se Certified Node (thinkagile) Xcc,Vx 2u4n Certified Node (thinkagile) Xcc,Vx 4u Certified Node (thinkagile) Xcc,Vx1320 (thinkagile) Xcc,Vx2320 (thinkagile) Xcc,Vx2330 Appliance (thinkagile) Xcc,Vx3320 (thinkagile) Xcc,Vx3330 Appliance (thinkagile) Xcc,Vx3520-g (thinkagile) Xcc,Vx3530-g Appliance (thinkagile) Xcc,Vx3720 (thinkagile) Xcc,Vx5520 (thinkagile) Xcc,Vx5530 Appliance (thinkagile) Xcc,Vx635 V3 Integrated System (thinkagile) Xcc,Vx645 V3 Certified Node (thinkagile) Xcc,Vx645 V3 Integrated System (thinkagile) Xcc,Vx655 V3 Certified Node (thinkagile) Xcc,Vx655 V3 Integrated System (thinkagile) Xcc,Vx665 V3 Certified Node (thinkagile) Xcc,Vx665 V3 Integrated System (thinkagile) Xcc,Vx7320 N (thinkagile) Xcc,Vx7330 Appliance (thinkagile) Xcc,Vx7520 (thinkagile) Xcc,Vx7520 N (thinkagile) Xcc,Vx7530 Appliance (thinkagile) Xcc,Vx7531 Certified Node (thinkagile) Xcc,Vx7820 (thinkagile) Xcc",7.2,HIGH,0.0005200000014156103,false,,false,false,false,,,false,false,,2024-09-13T17:27:19.968Z,0