EXECUTIVE SUMMARY:
A high-severity local privilege-escalation vulnerability has been identified in Lenovo’s Dispatcher driver stack, tracked as CVE-2025-8061. The flaw allows a local, authenticated user to send crafted IOCTL requests to the vulnerable LnvMSRIO.sys / Dispatcher driver, abuse kernel read/write primitives to leak kernel addresses and bypass mitigations and ultimately achieve kernel-level code execution (SYSTEM). Public proof-of-concept code and technical writeups demonstrate practical exploitation in many environments.
This vulnerability poses a serious risk for systems with the affected Lenovo Dispatcher driver installed: successful exploitation can lead to full local system compromise (SYSTEM), persistent backdoors or unsigned code execution, and increased enterprise exposure if an attacker gains a non-privileged foothold.
RECOMMENDATION:
We strongly recommend you update Lenovo Dispatcher to version 3.1.0.41 or later.
REFERENCES:
The following reports contain further technical details:
https://cybersecuritynews.com/lenovo-code-execution-vulnerability-poc/