Impact
The vulnerability in ZimaOS versions up to 1.5.0 allows a user to bypass authentication when the login username matches a known system service account because the password validation result is misinterpreted or ignored. Any actor who knows one of these system account names can log in using an arbitrary password, thereby gaining unauthorized system access. This flaw enables attackers to compromise confidentiality, integrity, and availability of the device. The weakness is classified as CWE‑287, Authentication Bypass.
Affected Systems
IceWhaleTech ZimaOS, an operating system for Zima devices and x86‑64 systems with UEFI, is affected. All releases up to and including version 1.5.0 contain the flaw; no patched version is presently available.
Risk and Exploitability
The vulnerability has a CVSS score of 9.4 and an EPSS probability of 14 %, indicating a high likelihood of exploitation. It has not been listed in the CISA KEV catalog. The flaw can be exploited via the login interface, and if that interface is exposed remotely, attackers may gain full system authorization. The risk remains high until a vendor patch or configuration mitigation is applied.
OpenCVE Enrichment