Risk | Low |
Patch available | NO |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2025-4275 |
CWE-ID | CWE-749 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
InsydeH2O Kernel Hardware solutions / Firmware |
Vendor | Insyde Software |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU110699
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-4275
CWE-ID:
CWE-749 - Exposed Dangerous Method or Function
Exploit availability: No
DescriptionThe vulnerability allows an attacker to escalate privileges on the system.
The vulnerability exists due to usage of an unprotected NVRAM variable. An attacker with physical access to the system can inject their own certificate in this variable and subsequently run arbitrary firmware (signed by the injected certificate) during the early boot process within the UEFI environment.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsInsydeH2O Kernel: All versions
CPE2.3 External linkshttps://www.kb.cert.org/vuls/id/211341
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.