Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-2296

Опубликовано: 09 дек. 2025
Источник: debian
EPSS Низкий

Описание

EDK2 contains a vulnerability in BIOS where an attacker may cause “ Improper Input Validation” by local access. Successful exploitation of this vulnerability could alter control flow in unexpected ways, potentially allowing arbitrary command execution and impacting Confidentiality, Integrity, and Availability.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
edk2fixed2025.02-1package
edk2no-dsabookwormpackage

Примечания

  • https://github.com/tianocore/edk2/security/advisories/GHSA-6pp6-cm5h-86g5

  • https://github.com/tianocore/edk2/pull/10628

  • https://www.kraxel.org/blog/2025/12/analyzing-cve-2025-2296/

EPSS

Процентиль: 40%
0.00181
Низкий

Связанные уязвимости

ubuntu
4 месяца назад

EDK2 contains a vulnerability in BIOS where an attacker may cause “ Improper Input Validation” by local access. Successful exploitation of this vulnerability could alter control flow in unexpected ways, potentially allowing arbitrary command execution and impacting Confidentiality, Integrity, and Availability.

CVSS3: 8.2
redhat
4 месяца назад

EDK2 contains a vulnerability in BIOS where an attacker may cause “ Improper Input Validation” by local access. Successful exploitation of this vulnerability could alter control flow in unexpected ways, potentially allowing arbitrary command execution and impacting Confidentiality, Integrity, and Availability.

nvd
4 месяца назад

EDK2 contains a vulnerability in BIOS where an attacker may cause “ Improper Input Validation” by local access. Successful exploitation of this vulnerability could alter control flow in unexpected ways, potentially allowing arbitrary command execution and impacting Confidentiality, Integrity, and Availability.

CVSS3: 8.2
msrc
4 месяца назад

Un-verified kernel bypass Secure Boot mechanism in direct boot mode

github
4 месяца назад

EDK2 contains a vulnerability in BIOS where an attacker may cause “ Improper Input Validation” by local access. Successful exploitation of this vulnerability could alter control flow in unexpected ways, potentially allowing arbitrary command execution and impacting Confidentiality, Integrity, and Availability.

EPSS

Процентиль: 40%
0.00181
Низкий