Improper authentication in EDK II may allow a privileged user to potentially enable information disclosure via network access.
Source: MITRE
Published: 2020-11-23
Updated: 2020-11-25
Type: CWE-287
Base Score: 4
Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N
Impact Score: 2.9
Exploitability Score: 8
Severity: MEDIUM
Base Score: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Impact Score: 3.6
Exploitability Score: 1.2
Severity: MEDIUM