2
0
1
1
Vulnerability Timeline
2 vulnerabilities discovered over time for Yocto
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2025-61611 | 7.5 | This vulnerability allows an attacker to remotely crash the modem, causing a denial of service without needing any special permissions. It occurs due to improper checks on the input data sent to the modem. | linuxfoundationyocto | Theoretical | 29 days agoMar 9, 2026 |
| CVE-2026-20435 | 4.6 | This vulnerability allows an attacker with physical access to a device to read unique identifiers that could reveal sensitive information about the device. No special permissions or user actions are needed to exploit this flaw, making it a significant risk for devices that may be left unattended. | linuxfoundationyocto | Exploit Available | about 1 month agoMar 2, 2026 |
About Linuxfoundation Yocto Security
This page provides comprehensive security vulnerability tracking for Linuxfoundation Yocto. Our database includes all CVEs affecting this product, updated in real-time from official sources.
Each vulnerability listing includes detailed CVSS severity analysis, exploit availability status, AI-generated explanations, and direct links to official security patches and vendor advisories.
Security Recommendations
- • Always keep Yocto updated to the latest version
- • Subscribe to security advisories from Linuxfoundation
- • Monitor this page for new vulnerabilities affecting your version
- • Prioritize patching critical and high severity issues immediately