Description
Out-of-bounds Read vulnerability in CloverHackyColor CloverBootloader (MdeModulePkg/Universal/RegularExpressionDxe/Oniguruma modules). This vulnerability is associated with program files regparse.C.

This issue affects CloverBootloader: before 5162.
Published: 2026-01-27
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information disclosure through out-of-bounds read
Action: Patch immediately
AI Analysis

Impact

The vulnerability occurs in the CloverBootloader’s Oniguruma regular expression engine, specifically within the regparse.C module. An out-of-bounds read can expose data located beyond the intended bounds, potentially revealing sensitive information held in memory. The description does not indicate that an attacker can achieve code execution or privilege escalation from this flaw.

Affected Systems

This flaw impacts CloverHackyColor CloverBootloader binaries with a build version earlier than 5162. The affected product is the CloverBootloader used as a macOS bootloader.

Risk and Exploitability

The CVSS score of 6.9 points to a medium-to-high risk level. The EPSS score is less than 1%, which suggests the likelihood of an active exploit is very low. The vulnerability is not listed in the CISA KEV catalog. The attack vector is not explicitly documented; it is inferred that an attacker would need local or physical access to the device’s boot environment, enabling them to supply a malicious regular expression during boot to trigger the out-of-bounds read.

Generated by OpenCVE AI on April 18, 2026 at 18:48 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade CloverBootloader to version 5162 or later, which incorporates the fix for the out-of-bounds read.
  • If an upgrade cannot be performed immediately, consider disabling the Oniguruma regular expression engine or any components that load regparse.C from the bootloader configuration to mitigate the risk.
  • Apply secure boot measures or verify that the bootloader binary has not been tampered with to reduce the risk of malicious code execution during boot.

Generated by OpenCVE AI on April 18, 2026 at 18:48 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 27 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 27 Jan 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Cloverhackycolor
Cloverhackycolor cloverbootloader
Vendors & Products Cloverhackycolor
Cloverhackycolor cloverbootloader

Tue, 27 Jan 2026 08:30:00 +0000

Type Values Removed Values Added
Description Out-of-bounds Read vulnerability in CloverHackyColor CloverBootloader (MdeModulePkg/Universal/RegularExpressionDxe/Oniguruma modules). This vulnerability is associated with program files regparse.C. This issue affects CloverBootloader: before 5162.
Title A Out-of-bounds Read vulnerability in CloverHackyColor/CloverBootloader
Weaknesses CWE-125
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/S:N/AU:Y/R:U/V:C/RE:L/U:Amber'}


Subscriptions

Cloverhackycolor Cloverbootloader
cve-icon MITRE

Status: PUBLISHED

Assigner: GovTech CSG

Published:

Updated: 2026-01-27T21:39:06.965Z

Reserved: 2026-01-27T08:18:43.268Z

Link: CVE-2026-24796

cve-icon Vulnrichment

Updated: 2026-01-27T21:09:58.177Z

cve-icon NVD

Status : Deferred

Published: 2026-01-27T09:15:49.370

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-24796

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T19:00:08Z

Weaknesses