CVE-2026-24795

N/A Unknown

📋 TL;DR

An out-of-bounds write vulnerability in CloverBootloader's Oniguruma regular expression module allows attackers to write data beyond allocated memory boundaries. This affects systems using CloverBootloader before version 5162, potentially leading to system crashes or arbitrary code execution during boot process.

💻 Affected Systems

Products:
  • CloverHackyColor CloverBootloader
Versions: All versions before 5162
Operating Systems: macOS (hackintosh systems), Windows (dual-boot configurations), Linux (dual-boot configurations)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using CloverBootloader, primarily hackintosh and multi-boot systems. Standard Apple Macs are not affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise during boot process, allowing persistent malware installation or bricking the system.

🟠

Likely Case

System instability or crashes during boot, requiring physical intervention to recover.

🟢

If Mitigated

Limited impact if system uses secure boot or other boot protections that detect tampering.

🌐 Internet-Facing: LOW - Bootloader vulnerabilities typically require local access or compromised boot media.
🏢 Internal Only: MEDIUM - Malicious insiders or compromised internal systems could exploit this during boot.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires physical access or ability to modify boot configuration. No public exploit code has been identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5162 and later

Vendor Advisory: https://github.com/CloverHackyColor/CloverBootloader/pull/733

Restart Required: Yes

Instructions:

1. Download CloverBootloader version 5162 or newer from official repository. 2. Create bootable USB with updated version. 3. Boot from USB and install updated bootloader. 4. Reboot system.

🔧 Temporary Workarounds

Disable Regular Expression Module

all

Remove or disable the vulnerable RegularExpressionDxe module from bootloader configuration

Edit config.plist to remove RegularExpressionDxe.efi from Drivers section

Enable Secure Boot

all

Use UEFI Secure Boot to prevent unauthorized bootloader modifications

Enable Secure Boot in UEFI/BIOS settings

🧯 If You Can't Patch

  • Restrict physical access to systems using CloverBootloader
  • Implement full disk encryption to protect against boot-time attacks

🔍 How to Verify

Check if Vulnerable:

Check CloverBootloader version in boot menu or using 'clover --version' command if available

Check Version:

Check version in boot menu or examine EFI partition for version files

Verify Fix Applied:

Verify installed CloverBootloader version is 5162 or higher

📡 Detection & Monitoring

Log Indicators:

  • Unexpected system crashes during boot
  • Bootloader error messages related to regular expressions

Network Indicators:

  • None - this is a local boot-time vulnerability

SIEM Query:

Not applicable - local boot process vulnerability

🔗 References

📤 Share & Export