A security issue was found in Sparkle before version 2.6.4. An attacker can replace an existing signed update with another payload, bypassing Sparkle’s (Ed)DSA signing checks.
https://sparkle-project.org/documentation/security-and-reliability/
https://security.netapp.com/advisory/ntap-20250124-0008/
https://github.com/sparkle-project/Sparkle/pull/2550
Source: Mitre, NVD
Published: 2025-02-04
Updated: 2025-02-17
Base Score: 6.2
Vector: CVSS2#AV:A/AC:H/Au:M/C:C/I:C/A:C
Severity: Medium
Base Score: 7.3
Vector: CVSS:3.0/AV:A/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H
Severity: High