Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 10 Dec 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tianocore
Tianocore edk2 |
|
| Vendors & Products |
Tianocore
Tianocore edk2 |
Wed, 10 Dec 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Tue, 09 Dec 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | EDK2 contains a vulnerability in BIOS where an attacker may cause “ Improper Input Validation” by local access. Successful exploitation of this vulnerability could alter control flow in unexpected ways, potentially allowing arbitrary command execution and impacting Confidentiality, Integrity, and Availability. | |
| Title | Un-verified kernel bypass Secure Boot mechanism in direct boot mode | |
| Weaknesses | CWE-20 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: TianoCore
Published:
Updated: 2025-12-09T15:11:26.289Z
Reserved: 2025-03-13T18:56:58.225Z
Link: CVE-2025-2296
Updated: 2025-12-09T15:11:20.253Z
Status : Deferred
Published: 2025-12-09T16:17:41.633
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-2296
OpenCVE Enrichment
Updated: 2025-12-10T17:49:37Z