The vault key is sealed using SHA1 PCRs instead of SHA256 PCRs
Thus an attacker with physical access to an EVE-OS device can try to brute force creating a kernel or rootfs image which produces the same SHA1 PCR but with malicious content.
Fixed in 9.4.3-lts and 10.1.0
None
{
"nvd_published_at": null,
"severity": "MODERATE",
"github_reviewed": true,
"cwe_ids": [
"CWE-327",
"CWE-328",
"CWE-522"
],
"github_reviewed_at": "2026-02-04T23:12:29Z"
}