Overview
IGEL OS contains a use of a key past its expiration date vulnerability that allows for Secure Boot bypass. The igel-flash-driver module improperly verifies a cryptographic signature. Ultimately, a crafted root filesystem can be mounted from an unverified SquashFS image.
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-47827 ; https://nvd.nist.gov/vuln/detail/CVE-2025-47827
Key Details
| Property | Value |
|---|---|
| CVE ID | CVE-2025-47827 |
| Vendor / Product | IGEL — IGEL OS |
| NVD Published | 2025-06-05 |
| NVD Last Modified | 2025-11-05 |
| CVSS 3.1 Score | 4.6 |
| CVSS 3.1 Vector | CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
| Severity | MEDIUM |
| CWE | CWE-347 |
| CISA KEV Added | 2025-10-14 |
| CISA KEV Deadline | 2025-11-04 |
| Known Ransomware Use | No |
CVSS 3.1 Breakdown
Attack Vector
Physical
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Required Action
CISA BOD 22-01 Deadline: 2025-11-04.
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Timeline
| Date | Event |
|---|---|
| 2025-10-14 | Added to CISA Known Exploited Vulnerabilities catalog |
| 2025-11-04 | CISA BOD 22-01 remediation deadline |
References
| Resource | Type |
|---|---|
| NVD — CVE-2025-47827 | Vulnerability Database |
| CISA KEV Catalog Entry | US Government |