CVE-2026-20435
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker with physical access to a device to read unique identifiers that could reveal sensitive information about the device. No special permissions or user actions are needed to exploit this flaw, making it a significant risk for devices that may be left unattended.
Technical Description
In preloader, there is a possible read of device unique identifiers due to a logic error. This could lead to local information disclosure, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS10607099; Issue ID: MSV-6118.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 2, 2026
about 1 month ago
Last Modified
Mar 3, 2026
about 1 month ago
Vendor
linuxfoundation
Product
yocto
Related Vulnerabilities
This vulnerability allows an attacker to remotely crash the modem, causing a denial of service without needing any special permissions. It occurs due to improper checks on the input data sent to the modem.
This vulnerability allows an attacker to run any Python code on a server using the Backstage platform, potentially taking full control of the system. It occurs when the attacker can create a specially crafted configuration file for documentation that bypasses security checks, and it has been fixed in the latest version.