CVE Alert: CVE-2025-9319 – Lenovo – Wallpaper Client

CVE-2025-9319

HIGHNo exploitation known

A potential vulnerability was reported in the Lenovo Wallpaper Client that could allow arbitrary code execution under certain conditions.

CVSS v3.1 (7.5)
AV NETWORK · AC HIGH · PR NONE · UI REQUIRED · S UNCHANGED
Vendor
Lenovo
Product
Wallpaper Client
Versions
0 lte 3.0.70.3301
CWE
CWE-494, CWE-494: Download of Code Without Integrity Check
Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Published
2025-09-11T18:33:02.108Z
Updated
2025-09-11T19:07:57.735Z

AI Summary Analysis

Risk verdict

High risk of remote code execution via the wallpaper client, with network delivery and user interaction required; no active exploitation reported to date.

Why this matters

If exploited, an attacker could execute arbitrary code with high impact to confidentiality, integrity and availability. The requirement for user action means success hinges on user-enabled updates or actions, potentially enabling rapid compromise across affected endpoints.

Most likely attack path

Remote delivery over the network is feasible, but an active exploit requires user interaction and no privileges. The vulnerability involves downloading code without integrity checks, enabling tampered payloads to run in the context of the wallpaper client, elevating risk to the host system. Preconditioned by the need for a user action, an attacker would target users who routinely accept updates or media from the client.

Who is most exposed

Endpoints on Lenovo hardware with the wallpaper client installed—common in both consumer and enterprise deployments—are most at risk, particularly where automatic updates or network-facing update mechanisms are enabled.

Detection ideas

  • Unusual or unsigned code being executed via the wallpaper update flow.
  • Network activity to external hosts delivering update payloads to the client.
  • New or modified processes/services tied to the wallpaper client around update events.
  • Integrity check failures or manifest mismatches during update/download.
  • Anomalous registry/task changes following update attempts.

Mitigation and prioritisation

  • Remove or discontinue use of the wallpaper client where feasible; sunset in existing images/builds.
  • If removal isn’t possible, disable automatic updates and enforce strict code integrity checks; block unsigned payloads.
  • Implement network allowlists and monitor wallpaper-update traffic with EDR/IDS; alert on anomalous payload delivery or execution.
  • Update incident response and change-management records; replace the component with a supported alternative.
  • No patch available; treat as priority 2 risk until decommissioned (no KEV/EPSS signals to upgrade to priority 1).

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.