Vulnerabilities
Vulnerable Software
An attacker with root account privileges can load any legitimately signed firmware image into the Audio Co-Processor (ACP,) irrespective of the respective signing key being declared as usable for authenticating an ACP firmware image, potentially resulting in a denial of service.
CVSS Score
4.4
EPSS Score
0.0
Published
2022-07-14


Contact Us

Shodan ® - All rights reserved