Common vulnerabilities and Exposures (CVE)

Skip to main content

Required CVE Record Information

Description

Memory corruption can occur if an already verified IFS2 image is overwritten, bypassing boot verification. This allows unauthorized programs to be injected into security-sensitive images, enabling the booting of a tampered IFS2 system image.

CVSS 1 Total

ScoreSeverityVersionVector String
8.4HIGH3.1CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Product Status

Learn more

Versions 41 Total

Default Status: unaffected

affected

Authorized Data Publishers