8.2 CVE-2025-3052
An arbitrary write vulnerability in Microsoft signed UEFI firmware allows for code execution of untrusted software. This allows an attacker to control its value, leading to arbitrary memory writes, including modification of critical firmware settings stored in NVRAM. Exploiting this vulnerability could enable security bypasses, persistence mechanisms, or full system compromise.
https://nvd.nist.gov/vuln/detail/CVE-2025-3052
Categories
No category defined
References
af854a3a-2127-422b-91ae-364da2661108
cret@cert.org
AFFECTED (from MITRE)
| Vendor |
Product |
Versions |
| DT Research |
BiosFlashShell |
|
| DT Research |
BiosFlashShell |
|
| DT Research |
Dtbios |
|
| DT Research |
Dtbios |
|
| DT Research |
Dtbios |
|
| DT Research |
Dtbios |
|
| DT Research |
Dtbios |
|
| DT Research |
Dtbios |
|
| DT Research |
Dtbios |
|
| DT Research |
Dtbios |
|
| DT Research |
Dtbios |
|
| DT Research |
Dtbios |
|
| DT Research |
Dtbios |
|
| DT Research |
Dtbios |
|
| © 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation. |
CPE
REMEDIATION
EXPLOITS
Exploit-db.com
| id |
description |
date |
|
| No known exploits |
POC Github
Other Nist (github, ...)
CAPEC
Common Attack Pattern Enumerations and Classifications
| id |
description |
severity |
| No entry |
Cybersecurity needs ?
Strengthen software security from the outset with our DevSecOps expertise
Integrate security right from the start of the software development cycle for more robust applications and greater customer confidence.
Our team of DevSecOps experts can help you secure your APIs, data pipelines, CI/CD chains, Docker containers and Kubernetes deployments.
Discover this offer