Memory corruption can occur if an already verified IFS2 image is overwritten, bypassing boot verification. This allows unauthorized programs to be injected into security-sensitive images, enabling the booting of a tampered IFS2 system image.
This Cyber News was published on www.tenable.com. Publication date: Tue, 07 Jan 2025 07:11:02 +0000