Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2017-3767


A local privilege escalation vulnerability was identified in the Realtek audio driver versions prior to 6.0.1.8224 in some Lenovo ThinkPad products. An attacker with local privileges could execute code with administrative privileges.


Security Impact Summary

This vulnerability carries a HIGH severity rating with a CVSS v3.1 score of 7.8, requiring local system access to exploit with relatively low complexity without requiring user interaction requiring only low-level privileges . The vulnerability impacts confidentiality (data exposure), integrity (unauthorized modifications), and availability (service disruption) for affected systems. Impacting 47 products from realtek, from lenovo, from lenovo and 44 others, organizations running these solutions should prioritize assessment and patching.

Historical Context

First disclosed in 2017, this vulnerability was reported during a period defined by widespread IoT adoption challenges, mobile security concerns, and the emergence of advanced persistent threat (APT) techniques. Contemporary mitigation strategies focused on secure development practices and third-party component vetting.


Published

2017-11-13T16:29:00.293

Last Modified

2025-04-20T01:37:25.860

Status

Deferred

Source

[email protected]

Severity

CVSSv3.0: 7.8 (HIGH)

CVSSv2 Vector

AV:L/AC:L/Au:N/C:C/I:C/A:C

  • Access Vector: LOCAL
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

3.9

Impact Score

10.0

Weaknesses
  • Type: Primary
    NVD-CWE-noinfo

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System realtek audio_driver_firmware < 6.0.1.8224 Yes
Hardware lenovo thinkpad_10 - No
Hardware lenovo thinkpad_11e - No
Hardware lenovo thinkpad_13 - No
Hardware lenovo thinkpad_l450 - No
Hardware lenovo thinkpad_l460 - No
Hardware lenovo thinkpad_l470_kbl - No
Hardware lenovo thinkpad_l470_skl - No
Hardware lenovo thinkpad_l560 - No
Hardware lenovo thinkpad_p50 - No
Hardware lenovo thinkpad_p50s - No
Hardware lenovo thinkpad_p51s - No
Hardware lenovo thinkpad_p70 - No
Hardware lenovo thinkpad_p71 - No
Hardware lenovo thinkpad_s1 - No
Hardware lenovo thinkpad_s1_yoga - No
Hardware lenovo thinkpad_s1_yoga_12 - No
Hardware lenovo thinkpad_s2 - No
Hardware lenovo thinkpad_t440 - No
Hardware lenovo thinkpad_t440p - No
Hardware lenovo thinkpad_t440s - No
Hardware lenovo thinkpad_t450 - No
Hardware lenovo thinkpad_t450s - No
Hardware lenovo thinkpad_t460 - No
Hardware lenovo thinkpad_t460p - No
Hardware lenovo thinkpad_t460s - No
Hardware lenovo thinkpad_t470 - No
Hardware lenovo thinkpad_t470p - No
Hardware lenovo thinkpad_t470s_skl - No
Hardware lenovo thinkpad_t540p - No
Hardware lenovo thinkpad_t550 - No
Hardware lenovo thinkpad_t560 - No
Hardware lenovo thinkpad_t570 - No
Hardware lenovo thinkpad_w540 - No
Hardware lenovo thinkpad_w541 - No
Hardware lenovo thinkpad_w550s - No
Hardware lenovo thinkpad_x1_carbon - No
Hardware lenovo thinkpad_x1_tablet - No
Hardware lenovo thinkpad_x1_yoga - No
Hardware lenovo thinkpad_x1c - No
Hardware lenovo thinkpad_x240 - No
Hardware lenovo thinkpad_x240s - No
Hardware lenovo thinkpad_x250 - No
Hardware lenovo thinkpad_x260 - No
Hardware lenovo thinkpad_x270_kbl - No
Hardware lenovo thinkpad_x270_skl - No
Hardware lenovo thinkpad_yoga_11e - No

References

How SecUtils Interprets This CVE

SecUtils normalizes and enriches National Vulnerability Database (NVD) records by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and providing structured context for security teams. For realtek's affected products, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference data to enable rapid vulnerability prioritization and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and security operations.