Lenovo, and possibly other PC vendors, is exposed to a UEFI bug that can be exploited to disable firmware write-protection.

If the claims made by Dmytro Oleksiuk at Github are correct, an attacker can “disable flash write protection and infect platform firmware, disable Secure Boot, [and] bypass Virtual Secure Mode (Credential Guard, etc.) on Windows 10 Enterprise.”

The reason Oleksiuk believes other vendors are also vulnerable is that the buggy code is inherited from Intel. He writes that the SystemSmmRuntimeRt was copied from Intel reference code.

Lenovo complains in its advisory that it tried to make contact with Oleksiuk before he published the vulnerability.

The company says the vulnerable System Management Mode software came from an upstream BIOS vendor – making it likely that other vendors getting BIOS software from the same outlet will also be vulnerable.

There's also a hint that Lenovo agrees with a speculation by Oleksiuk, that the code may be an intentional backdoor: “Lenovo is engaging all of its IBVs as well as Intel to identify or rule out any additional instances of the vulnerability's presence in the BIOS provided to Lenovo by other IBVs, as well as the original purpose of the vulnerable code” (emphasis added).

A follower of Oleksiuk said on Twitter the vulnerable code is also present in a 2010-era HP Pavillion machine:

@d_olex Yep, found SmmRuntimeManagementCallback() function in HP dv7 4087cl (from ~2010, HM55) with Insyde EFI pic.twitter.com/M5jrsrAO8d — Alex James (@al3xtjames) July 2, 2016

Oleksiuk's Github publication includes instructions for seeking out the vulnerable code. ®