Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24796: CWE-125 Out-of-bounds Read in CloverHackyColor CloverBootloader

0
Medium
VulnerabilityCVE-2026-24796cvecve-2026-24796cwe-125
Published: Tue Jan 27 2026 (01/27/2026, 08:22:20 UTC)
Source: CVE Database V5
Vendor/Project: CloverHackyColor
Product: CloverBootloader

Description

Out-of-bounds Read vulnerability in CloverHackyColor CloverBootloader (MdeModulePkg/Universal/RegularExpressionDxe/Oniguruma modules). This vulnerability is associated with program files regparse.C. This issue affects CloverBootloader: before 5162.

AI-Powered Analysis

AILast updated: 01/27/2026, 08:51:19 UTC

Technical Analysis

CVE-2026-24796 identifies an out-of-bounds read vulnerability (CWE-125) in the CloverHackyColor CloverBootloader, a popular bootloader used primarily in Hackintosh environments to enable macOS to run on non-Apple hardware. The vulnerability resides in the Oniguruma regular expression modules within the MdeModulePkg/Universal/RegularExpressionDxe component, specifically in the regparse.C program files. An out-of-bounds read occurs when the software reads memory outside the allocated buffer, which can lead to information disclosure or cause undefined behavior. The flaw affects all versions of CloverBootloader before build 5162. Exploitation requires local access (AV:L), but no privileges (PR:N) or user interaction (UI:N) are needed, making it a low-complexity attack vector. The vulnerability does not impact confidentiality fully (R:U) but has a high impact on availability (VA:H) due to potential memory corruption side effects. No known public exploits exist yet, and no patches have been linked, indicating the need for vigilance and prompt updates once fixes are released. The vulnerability is significant in environments where CloverBootloader is used to manage boot processes, as it could allow attackers to read sensitive memory areas, potentially exposing cryptographic keys or other critical data during system startup.

Potential Impact

For European organizations, the primary impact of CVE-2026-24796 lies in the potential unauthorized disclosure of sensitive information during the boot process. Since CloverBootloader is commonly used in Hackintosh setups and some custom macOS deployments, organizations relying on such systems for development, testing, or specialized workflows could face confidentiality risks. The vulnerability could be exploited by an attacker with local access to extract memory contents, potentially exposing credentials, encryption keys, or proprietary information. While it does not directly compromise system integrity or availability, the information leakage could facilitate further attacks or unauthorized access. Given the medium severity, the risk is moderate but should not be underestimated, especially in environments with sensitive data or regulatory compliance requirements such as GDPR. The lack of known exploits reduces immediate risk but also means organizations should proactively patch and monitor affected systems to prevent future exploitation.

Mitigation Recommendations

1. Update CloverBootloader to version 5162 or later as soon as a patched release is available to address the out-of-bounds read vulnerability. 2. Restrict local access to systems running CloverBootloader by enforcing strict physical and logical access controls, including multi-factor authentication and endpoint security measures. 3. Monitor system logs and bootloader behavior for unusual activity that could indicate exploitation attempts. 4. Conduct regular audits of systems using CloverBootloader to identify unauthorized modifications or suspicious processes. 5. For organizations using Hackintosh or custom macOS environments, consider migrating to officially supported hardware and bootloaders to reduce exposure to such vulnerabilities. 6. Implement memory protection mechanisms and secure boot features where possible to limit the impact of bootloader vulnerabilities. 7. Educate IT staff about the risks associated with bootloader vulnerabilities and the importance of timely patching and access control.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GovTech CSG
Date Reserved
2026-01-27T08:18:43.268Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 697878ed4623b1157c0fa6a3

Added to database: 1/27/2026, 8:35:57 AM

Last enriched: 1/27/2026, 8:51:19 AM

Last updated: 2/6/2026, 10:06:50 AM

Views: 24

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats