{ "CVE_data_meta": { "ASSIGNER": "psirt@lenovo.com", "DATE_PUBLIC": "2018-07-13T00:00:00", "ID": "CVE-2018-9070", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Lenovo Smart Assistant", "version": { "version_data": [ { "version_value": "Earlier than 12.1.82" } ] } } ] }, "vendor_name": "Lenovo Group Ltd." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "For the Lenovo Smart Assistant Android app versions earlier than 12.1.82, an attacker with physical access to the smart speaker can, by pressing a specific button sequence, enter factory test mode and enable a web service intended for testing the device. As with most test modes, this provides extra privileges, including changing settings and running code. Lenovo Smart Assistant is an Amazon Alexa-enabled smart speaker developed by Lenovo." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Root access of the device" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.lenovo.com/us/en/solutions/LEN-22172", "refsource": "CONFIRM", "url": "https://support.lenovo.com/us/en/solutions/LEN-22172" } ] } }