Uncontrolled resource consumption in EDK II may allow an unauthenticated user to potentially enable denial of service via network access.
{ "urgency": "low" }