A Secure Boot Bypass Vulnerability exists in affected Access Points that allows an adversary to bypass the hardware root of trust verification in place to ensure only vendor-signed firmware can execute on the device. An adversary can exploit this vulnerability to run modified or custom firmware on affected Access Points.
References
Configurations
No configuration.
History
14 Oct 2025, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-290 |
14 Oct 2025, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-14 17:15
Updated : 2025-10-14 20:15
NVD link : CVE-2025-37147
Mitre link : CVE-2025-37147
CVE.ORG link : CVE-2025-37147
JSON object : View
Products Affected
No product.
CWE
CWE-290
Authentication Bypass by Spoofing
