Impact
The Sentry kernel implements a sys_int_* syscall family that allows tasks to manipulate IRQ lines. An incomplete ownership check permits a task that holds DEV or IO capability to alter the IRQ configuration of another task, leading to a denial‑of‑service by disrupting interrupt handling or forging a covert channel between the two tasks and the external environment. This flaw is an improper access control error categorized as CWE‑283.
Affected Systems
Camelot‑OS Sentry Kernel versions earlier than 0.4.7 are vulnerable. Any embedded system running one of these kernel releases is affected.
Risk and Exploitability
The CVSS score of 5.1 denotes moderate severity; the EPSS score is not available and the issue is not listed in CISA to- be exploited vulnerabilities. Based on the description, it is inferred that an attacker must be able to execute a task with DEV or IO capability, which suggests a local or compromised‑process attack vector. Consequently, the risk is limited to environments where such privileges can be obtained, and no remote exploitation mechanism is explicitly disclosed.
OpenCVE Enrichment