How to mitigate the security vulnerability in the Nios® II Command Shell utility? - How to mitigate the security vulnerability in the Nios® II Command Shell utility? Description Due to a problem in the Quartus ® Prime Standard and Lite Edition Software version 19.1 through 24.1, the Nios® II Command Shell utility included in the Quartus ® Prime Software for Windows* is vulnerable to a Current Working Directory (CWD) planting attack. The Linux* versions are not affected. Resolution To work around this problem, replace the “Nios II Command Shell.bat” Windows Batch File located in the <drive>:\<edition>\<version number>\nios2eds\ , with the attached file below. This problem is fixed beginning with the Quartus® Prime Standard and Lite Edition Software version 25.1. Custom Fields values: ['novalue'] Troubleshooting 14024757303 novalue ['novalue'] ['FPGA Dev Tools Quartus® Prime Software Standard'] 25.1 24.1 ['Arria® V FPGAs and SoCs', 'Arria® II FPGAs', 'Cyclone® 10 LP FPGA', 'Cyclone® IV FPGAs', 'Cyclone® V FPGAs and SoCs', 'MAX® 10 FPGA', 'MAX® V CPLDs', 'MAX® II CPLD', 'Stratix® V FPGAs', 'Stratix® IV FPGAs', 'Arria® V GZ FPGA'] ['novalue'] ['novalue'] ['novalue'] - 2026-01-27

external_document