Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 03 Apr 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Time‑of‑Check to Time‑of‑Use Race Condition in Balena Etcher Allows Privilege Escalation | |
| First Time appeared |
Balena-io
Balena-io etcher |
|
| Vendors & Products |
Balena-io
Balena-io etcher |
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-367 | |
| Metrics |
ssvc
|
Thu, 02 Apr 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A Time-of-Check to Time-of-Use (TOCTOU) race condition vulnerability in Balena Etcher for Windows prior to v2.1.4 allows attackers to escalate privileges and execute arbitrary code via replacing a legitimate script with a crafted payload during the flashing process. | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-04-02T17:26:30.031Z
Reserved: 2026-03-04T00:00:00.000Z
Link: CVE-2026-30332
Updated: 2026-04-02T17:26:03.174Z
Status : Awaiting Analysis
Published: 2026-04-02T16:16:22.050
Modified: 2026-04-03T16:10:23.730
Link: CVE-2026-30332
No data.
OpenCVE Enrichment
Updated: 2026-04-03T09:19:01Z