Lenovo, the world’s No. 3 Android tablet maker, said BlueBorne patches are now available for four Lenovo Tab models, 14 Tab Essential models and three Yoga Tab models. The company also identified a tenth tablet SKU, Lenovo TB-8504F, which it said was also vulnerable to BlueBorne bugs, but would not receive patches.
BlueBorne vulnerabilities are considered high severity flaws, according to the Lenovo’s writeup of the patches released on Thursday. A spokesperson for Lenovo said that this latest round of BlueBorne patches completed the company’s patching for the bugs.
“We were done with laptops a while ago and this wraps it up with the tablets,” a Lenovo spokesperson told Threatpost. The company said it was not typical for Lenovo to wait so long to issue a security patch. “There are a variety of reasons why certain models get patched when they do. We work as hard as we can to get things fixed as quick as we can regardless of the product.”
In Sept. 2017, IoT security firm Armis disclosed a host of BlueBorne vulnerabilities that threaten billions of devices from Android and Apple smartphones to millions of printers, smart TVs and IoT devices that use the Bluetooth protocol. The vulnerabilities could enable an attacker to take over devices, spread malware, or establish a man-in-the-middle position to gain access to critical data and networks without user interaction.
At the time, Armis estimated that there were 5.3 billion devices were at risk, with 2.1 billion of those being Android devices. Of those Android devices, researchers estimated 900,000 were capable of receiving an update.
Patches are available for Lenovo tablet models: TB3-X70F, TB3-X70I, TB3-X70L, TB3-X70N, TB-7304F, TB-7304I, TB-7304X, TB-7504F, TB-7504X TB-8704V, TB-8704X, TB-X304F, TB-X304L, TB-X304N, TB-X704A, TB-X704F, TB-X704L, TB-X704V, YT-X703F, YT-X703L and YT-X703X.
“Our expectation was with within within 30 to 45 days of the announcement of BlueBorne — and the availability of patches — that the updates would have already been made,” said Nadir Izrael, CTO and cofounder of Armis, in an interview with Threatpost. “We coordinated with Google, Microsoft, Apple and many downstream partners on patches around the September disclosure period… Yes, we are surprised these tablets haven’t been patched already.”
Izrael also said he is very happy to see any company patching against a vulnerability at any point in time. “This highlights the problem that, in general, it’s still too hard for the industry to distribute patches in a timely manner,” he said.