Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2022-05896

Опубликовано: 01 мар. 2021
Источник: fstec
CVSS3: 6.4
CVSS2: 6
EPSS Низкий

Описание

Уязвимость реализации механизма верификации shim_lock загрузчика операционных систем Grub2 связана с некорректной проверкой криптографической подписи. Эксплуатация уязвимости может позволить нарушителю выполнить произвольный код и получить полный контроль над устройством

Вендор

Microsoft Corp
Erich Boleyn
ООО «Ред Софт»
ФССП России

Наименование ПО

Windows 8.1
Windows Server 2012
Windows Server 2012 R2
Windows 10
Windows 10 1607
Windows Server 2016
Windows RT 8.1
Windows Server 2012 R2 (Server Core installation)
Windows Server 2016 (Server Core installation)
Windows 10 1809
Windows Server 2019
Windows Server 2019 (Server Core installation)
Grub2
Windows 10 20H2
Windows Server 20H2 (Server Core Installation)
Windows 10 21H1
Windows Server 2022
Windows Server 2022 (Server Core installation)
Windows 11
РЕД ОС
ОС ТД АИС ФССП России
Windows Server 2012 (Server Core installation)

Версия ПО

- (Windows 8.1)
- (Windows 8.1)
- (Windows Server 2012)
- (Windows Server 2012 R2)
- (Windows 10)
- (Windows 10)
- (Windows 10 1607)
- (Windows 10 1607)
- (Windows Server 2016)
- (Windows RT 8.1)
- (Windows Server 2012 R2 (Server Core installation))
- (Windows Server 2016 (Server Core installation))
- (Windows 10 1809)
- (Windows 10 1809)
- (Windows Server 2019)
- (Windows Server 2019 (Server Core installation))
- (Windows 10 1809)
до 2.06 (Grub2)
- (Windows 10 20H2)
- (Windows 10 20H2)
- (Windows 10 20H2)
- (Windows Server 20H2 (Server Core Installation))
- (Windows 10 21H1)
- (Windows 10 21H1)
- (Windows 10 21H1)
- (Windows Server 2022)
- (Windows Server 2022 (Server Core installation))
- (Windows 11)
- (Windows 11)
7.3 (РЕД ОС)
ИК6 (ОС ТД АИС ФССП России)
- (Windows Server 2012 (Server Core installation))

Тип ПО

Операционная система

Операционные системы и аппаратные платформы

Microsoft Corp Windows 8.1 -
Microsoft Corp Windows 8.1 -
Microsoft Corp Windows Server 2012 -
Microsoft Corp Windows Server 2012 R2 -
Microsoft Corp Windows 10 -
Microsoft Corp Windows 10 -
Microsoft Corp Windows 10 1607 -
Microsoft Corp Windows 10 1607 -
Microsoft Corp Windows Server 2016 -
Microsoft Corp Windows RT 8.1 -
Microsoft Corp Windows Server 2012 R2 (Server Core installation) -
Microsoft Corp Windows Server 2016 (Server Core installation) -
Microsoft Corp Windows 10 1809 -
Microsoft Corp Windows 10 1809 -
Microsoft Corp Windows Server 2019 -
Microsoft Corp Windows Server 2019 (Server Core installation) -
Microsoft Corp Windows 10 1809 -
Erich Boleyn Grub2 до 2.06
Microsoft Corp Windows 10 20H2 -
Microsoft Corp Windows 10 20H2 -
Microsoft Corp Windows 10 20H2 -
Microsoft Corp Windows Server 20H2 (Server Core Installation) -
Microsoft Corp Windows 10 21H1 -
Microsoft Corp Windows 10 21H1 -
Microsoft Corp Windows 10 21H1 -
Microsoft Corp Windows Server 2022 -
Microsoft Corp Windows Server 2022 (Server Core installation) -
Microsoft Corp Windows 11 -
Microsoft Corp Windows 11 -
ООО «Ред Софт» РЕД ОС 7.3
ФССП России ОС ТД АИС ФССП России ИК6
Microsoft Corp Windows Server 2012 (Server Core installation) -

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 6)
Средний уровень опасности (базовая оценка CVSS 3.0 составляет 6,4)

Возможные меры по устранению уязвимости

Использование рекомендаций:
Для Grub2:
https://git.savannah.gnu.org/gitweb/?p=grub.git&view=view+git+repository
Для Ред ОС:
http://repo.red-soft.ru/redos/7.3c/x86_64/updates/
Для программных продуктов Microsoft Corp.:
https://msrc.microsoft.com/update-guide/vulnerability/ADV200011
Для ОС ТД АИС ФССП России:
https://goslinux.fssp.gov.ru/2726972/

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 20%
0.00064
Низкий

6.4 Medium

CVSS3

6 Medium

CVSS2

Связанные уязвимости

CVSS3: 6.4
ubuntu
больше 4 лет назад

If certificates that signed grub are installed into db, grub can be booted directly. It will then boot any kernel without signature validation. The booted kernel will think it was booted in secureboot mode and will implement lockdown, yet it could have been tampered. This flaw is a reintroduction of CVE-2020-15705 and only affects grub2 versions prior to 2.06 and upstream and distributions using the shim_lock mechanism.

CVSS3: 6.4
redhat
больше 4 лет назад

If certificates that signed grub are installed into db, grub can be booted directly. It will then boot any kernel without signature validation. The booted kernel will think it was booted in secureboot mode and will implement lockdown, yet it could have been tampered. This flaw is a reintroduction of CVE-2020-15705 and only affects grub2 versions prior to 2.06 and upstream and distributions using the shim_lock mechanism.

CVSS3: 6.4
nvd
больше 4 лет назад

If certificates that signed grub are installed into db, grub can be booted directly. It will then boot any kernel without signature validation. The booted kernel will think it was booted in secureboot mode and will implement lockdown, yet it could have been tampered. This flaw is a reintroduction of CVE-2020-15705 and only affects grub2 versions prior to 2.06 and upstream and distributions using the shim_lock mechanism.

CVSS3: 6.4
msrc
больше 4 лет назад

If certificates that signed grub are installed into db grub can be booted directly. It will then boot any kernel without signature validation. The booted kernel will think it was booted in secureboot mode and will implement lockdown yet it could have been tampered. This flaw is a reintroduction of CVE-2020-15705 and only affects grub2 versions prior to 2.06 and upstream and distributions using the shim_lock mechanism.

CVSS3: 6.4
debian
больше 4 лет назад

If certificates that signed grub are installed into db, grub can be bo ...

EPSS

Процентиль: 20%
0.00064
Низкий

6.4 Medium

CVSS3

6 Medium

CVSS2