Impact
The vulnerability occurs in the CloverBootloader’s Oniguruma regular expression engine, specifically within the regparse.C module. An out-of-bounds read can expose data located beyond the intended bounds, potentially revealing sensitive information held in memory. The description does not indicate that an attacker can achieve code execution or privilege escalation from this flaw.
Affected Systems
This flaw impacts CloverHackyColor CloverBootloader binaries with a build version earlier than 5162. The affected product is the CloverBootloader used as a macOS bootloader.
Risk and Exploitability
The CVSS score of 6.9 points to a medium-to-high risk level. The EPSS score is less than 1%, which suggests the likelihood of an active exploit is very low. The vulnerability is not listed in the CISA KEV catalog. The attack vector is not explicitly documented; it is inferred that an attacker would need local or physical access to the device’s boot environment, enabling them to supply a malicious regular expression during boot to trigger the out-of-bounds read.
OpenCVE Enrichment