Improper authentication in EDK II may allow a privileged user to potentially enable information disclosure via network access.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Edk2 | Tianocore | - (including) | - (including) |
Edk2 | Ubuntu | bionic | * |
Edk2 | Ubuntu | disco | * |
Edk2 | Ubuntu | eoan | * |
Edk2 | Ubuntu | trusty | * |
Edk2 | Ubuntu | upstream | * |
Edk2 | Ubuntu | xenial | * |