### [CVE-2025-4275](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4275) ![](https://img.shields.io/static/v1?label=Product&message=InsydeH2O&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=Kernel%205.2%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=Kernel%205.3%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=Kernel%205.4%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=Kernel%205.5%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=Kernel%205.6%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=Kernel%205.7%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=cwe-284%3A%20Improper%20Access%20Control&color=brightgreen) ### Description A vulnerability in the digital signature verification process does not properly validate variable attributes which allows an attacker to bypass signature verification by creating a non-authenticated NVRAM variable. An attacker may to execute arbitrary signed UEFI code and bypass Secure Boot. ### POC #### Reference - https://www.kb.cert.org/vuls/id/211341 #### Github - https://github.com/NikolajSchlej/Hydroph0bia - https://github.com/PuddinCat/GithubRepoSpider - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/tanjiti/sec_profile