CVE-2026-20753
Integer overflow in the UEFI firmware for the Slim Bootloader may allow an escalation of privilege. System software adversary with a privileged user combined with a low complexity attack may enable local code execution. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (high), integrity (high) and availability (high) impacts.
| CWE | CWE-190 |
| Vendor | n/a |
| Product | slim bootloader may allow an escalation of privilege. system software adversary with a privileged user combined with a low complexity attack may enable local code execution. this result may potentially occur via local access when attack requirements are present without special internal knowledge and requires no user interaction. the potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (high), integrity (high) and availability (high) impacts. |
| Published | May 12, 2026 |
| Last Updated | May 13, 2026 |
Get instant alerts for n/a slim bootloader may allow an escalation of privilege. system software adversary with a privileged user combined with a low complexity attack may enable local code execution. this result may potentially occur via local access when attack requirements are present without special internal knowledge and requires no user interaction. the potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (high), integrity (high) and availability (high) impacts.
Be the first to know when new unknown vulnerabilities affecting n/a slim bootloader may allow an escalation of privilege. system software adversary with a privileged user combined with a low complexity attack may enable local code execution. this result may potentially occur via local access when attack requirements are present without special internal knowledge and requires no user interaction. the potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (high), integrity (high) and availability (high) impacts. are published โ delivered to Slack, Telegram or Discord.