In IGEL OS before 11, Secure Boot can be bypassed because the igel-flash-driver module improperly verifies a cryptographic signature. Ultimately, a crafted root filesystem can be mounted from an unverified SquashFS image.
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-47827
https://securityaffairs.com/183479/security/u-s-cisa-adds-skysea-client-view-rapid7-velociraptor-microsoft-windows-and-igel-os-flaws-to-its-known-exploited-vulnerabilities-catalog.html
https://www.securityweek.com/microsoft-patches-173-vulnerabilities-including-exploited-windows-flaws/
https://www.infosecurity-magazine.com/news/last-windows-10-patch-tuesday-six/
https://thehackernews.com/2025/10/two-new-windows-zero-days-exploited-in.html
https://www.cisa.gov/news-events/alerts/2025/10/14/cisa-adds-five-known-exploited-vulnerabilities-catalog
https://www.helpnetsecurity.com/2025/10/15/microsoft-patch-tuesday-zero-days-cve-2025-24990-cve-2025-59230-cve-2025-47827/
https://arstechnica.com/security/2025/06/unearthed-in-the-wild-2-secure-boot-exploits-microsoft-patches-only-1-of-them/
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-47827
https://github.com/Zedeldi/igelfs
https://github.com/Zedeldi/CVE-2025-47827
Source: Mitre, NVD
Published: 2025-06-05
Updated: 2025-10-21
Known Exploited Vulnerability (KEV)
Base Score: 7.2
Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C
Severity: High
Base Score: 4.6
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Severity: Medium
EPSS: 0.00018