Integer truncation in EDK II may allow an authenticated user to potentially enable escalation of privilege via local access
Integer truncation in EDK II may allow an authenticated user to potentially enable escalation of privilege via local access.
Exploitability
AV:L
AC:L
PR:L
UI:N
Scope
S:U
Impact
C:H
I:H
A:H
7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H