Get a Demo

Let's Patch It!

Book a short call with one our specialists, we'll walk you through how Endor Patches work, and ask you a few questions about your environment (like your primary programming languages and repository management). We'll also send you an email right after you fill out the form, feel free to reply with any questions you have in advance!

CVE

CVE-2025-2296

edk2: EDK2: Improper Input Validation allows arbitrary command execution (important)
Back to all
CVE

CVE-2025-2296

edk2: EDK2: Improper Input Validation allows arbitrary command execution (important)

DOCUMENTATION: A flaw was found in EDK2 (EFI Development Kit 2). This vulnerability allows an attacker to cause arbitrary command execution and impact Confidentiality, Integrity, and Availability via improper input validation by local access. 

            STATEMENT: This vulnerability is considered Important because it compromises a key security control in the boot chain, Secure Boot enforcement—by allowing an unsigned kernel to be loaded through the legacy fallback path when direct-boot signature verification fails. Although exploitation requires high privileges, the flaw enables a reliable and unintended bypass of a protection mechanism explicitly designed to prevent unauthorized code from executing during early boot. This loss of integrity in a security-critical stage gives attackers the opportunity to introduce persistent modifications, tamper with system state, or load manipulated kernels outside the trusted key database. The impact is therefore more significant than a moderate flaw, as it affects a foundational trust anchor rather than a user-space component, and can meaningfully weaken the platform’s security posture even under restricted privilege conditions.

            MITIGATION: To reduce the risk by disabling direct-boot mode, ensuring all bootable kernels are signed and present in the Secure Boot DB, and restricting privileged access to prevent attackers from introducing unsigned payloads.

Package Versions Affected

Package Version
patch Availability
No items found.

Automatically patch vulnerabilities without upgrading

Fix Without Upgrading
Detect compatible fix
Apply safe remediation
Fix with a single pull request

CVSS Version

Severity
Base Score
CVSS Version
Score Vector
C
H
U
8.4
-
4.0
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
C
H
U
-
C
H
U
-

Related Resources

No items found.

References

https://access.redhat.com/security/cve/CVE-2025-2296

Severity

0

CVSS Score
0
10

Basic Information

Ecosystem
Base CVSS
0
EPSS Probability
0.00179%
EPSS Percentile
0.39621%
Introduced Version
0
Fix Available
2025.02-1,0:20240813-305.amzn2

Fix Critical Vulnerabilities Instantly

Secure your app without upgrading.
Fix Without Upgrading