Lenovo

Lenovo

Critical vulnerabilities were discovered in Lenovo’s AI-powered customer support chatbot, **Lena**, which leverages OpenAI’s GPT-4. The flaw stemmed from improper input and output sanitization, exposing the system to **cross-site scripting (XSS) attacks**. Security researchers at **Cybernews** demonstrated that attackers could exploit this by injecting malicious code via a **400-character prompt**, tricking the AI into generating harmful HTML content. This enabled threat actors to **steal session cookies**, potentially granting unauthorized access to Lenovo’s **customer support systems**.The vulnerability highlighted significant risks in poorly secured AI implementations, particularly as enterprises accelerate AI adoption. While no evidence of active exploitation was reported, the flaw posed a serious threat to **customer data integrity** and **system security**. Had attackers successfully leveraged this, they could have compromised **user sessions**, accessed sensitive support-related information, or escalated privileges within Lenovo’s infrastructure. The incident underscores the urgency for robust **AI security frameworks** to prevent such exposures in high-stakes enterprise environments.

Source: https://www.csoonline.com/article/4043005/lenovo-chatbot-breach-highlights-ai-security-blind-spots-in-customer-facing-systems.html

TPRM report: https://www.rankiteo.com/company/lenovo

"id": "len532082025",
"linkid": "lenovo",
"type": "Vulnerability",
"date": "8/2025",
"severity": "85",
"impact": "4",
"explanation": "Attack with significant impact with customers data leaks"
{'affected_entities': [{'industry': 'Technology (Hardware/Software)',
                        'location': 'Global (HQ: Hong Kong/China, Operations: '
                                    'Worldwide)',
                        'name': 'Lenovo',
                        'size': 'Large (Multinational)',
                        'type': 'Corporation'}],
 'attack_vector': 'Malicious Prompt Injection (400-character payload)',
 'data_breach': {'data_exfiltration': 'Potential (via XSS)',
                 'personally_identifiable_information': 'Potential (via '
                                                        'Session Cookies)',
                 'sensitivity_of_data': 'High (Session Hijacking Risk)',
                 'type_of_data_compromised': ['Session Cookies']},
 'description': 'Critical vulnerabilities were discovered in Lenovo’s '
                "AI-powered customer support chatbot, 'Lena' (powered by "
                'OpenAI’s GPT-4), allowing attackers to steal session cookies '
                'and potentially gain unauthorized access to customer support '
                'systems via a single malicious 400-character prompt. The flaw '
                'stemmed from improper input/output sanitization, enabling '
                'cross-site scripting (XSS) attacks by injecting malicious '
                'code through crafted prompts, which tricked the AI into '
                'generating harmful HTML content. The incident highlights '
                'security risks in poorly implemented AI chatbots as '
                'organizations rapidly adopt AI in enterprise environments.',
 'impact': {'brand_reputation_impact': 'High (Warning About AI Security Risks '
                                       'in Enterprise Adoption)',
            'data_compromised': ['Session Cookies',
                                 'Potential Unauthorized Access to Customer '
                                 'Support Systems'],
            'identity_theft_risk': 'Potential (via Stolen Session Cookies)',
            'operational_impact': 'Potential Unauthorized Access to Customer '
                                  'Support Systems',
            'systems_affected': ["Lenovo AI Chatbot 'Lena' (GPT-4 Powered)"]},
 'initial_access_broker': {'entry_point': "AI Chatbot ('Lena') via Malicious "
                                          'Prompt',
                           'high_value_targets': ['Customer Support Systems',
                                                  'Session Cookies']},
 'investigation_status': 'Disclosed by Cybernews Researchers (No Further '
                         'Updates)',
 'lessons_learned': 'The incident underscores the critical need for robust '
                    'input/output sanitization in AI-powered systems, '
                    'especially in customer-facing applications. Rapid AI '
                    'adoption in enterprises must be accompanied by rigorous '
                    'security testing to mitigate risks like XSS and prompt '
                    'injection attacks.',
 'post_incident_analysis': {'root_causes': ['Lack of Input/Output Sanitization '
                                            'in AI Chatbot',
                                            'Over-reliance on Third-Party AI '
                                            'Model (GPT-4) Without Adequate '
                                            'Security Controls',
                                            'Insufficient Security Testing for '
                                            'Prompt Injection '
                                            'Vulnerabilities']},
 'recommendations': ['Implement strict input/output sanitization for AI '
                     'chatbots to prevent XSS and prompt injection.',
                     'Conduct regular security audits and penetration testing '
                     'for AI systems, particularly those integrated with '
                     'third-party models (e.g., GPT-4).',
                     'Adopt secure coding practices for AI/ML applications, '
                     'including context-aware filtering for dynamic content '
                     'generation.',
                     'Monitor and limit the length/complexity of user prompts '
                     'to mitigate injection risks.',
                     'Educate developers and security teams on emerging '
                     'AI-specific threats (e.g., prompt hacking, model '
                     'manipulation).'],
 'references': [{'source': 'Cybernews'}],
 'title': 'Critical XSS Vulnerabilities in Lenovo’s AI-Powered Customer '
          "Support Chatbot 'Lena'",
 'type': ['Vulnerability Exploitation',
          'Cross-Site Scripting (XSS)',
          'AI Security Flaw'],
 'vulnerability_exploited': 'Improper Input/Output Sanitization in AI Chatbot '
                            '(XSS)'}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.