Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-14372

Опубликовано: 02 мар. 2021
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

A flaw was found in grub2 in versions prior to 2.06, where it incorrectly enables the usage of the ACPI command when Secure Boot is enabled. This flaw allows an attacker with privileged access to craft a Secondary System Description Table (SSDT) containing code to overwrite the Linux kernel lockdown variable content directly into memory. The table is further loaded and executed by the kernel, defeating its Secure Boot lockdown and allowing the attacker to load unsigned code. The highest threat from this vulnerability is to data confidentiality and integrity, as well as system availability.

A flaw was found in GRUB 2, where it incorrectly enables the usage of the ACPI command when Secure Boot is enabled. This flaw allows an attacker with privileged access to craft a Secondary System Description Table (SSDT) containing code to overwrite the Linux kernel lockdown variable content directly into memory. The kernel further loads and executes the table, defeating its Secure Boot lockdown and allowing the attacker to load unsigned code.

Отчет

For a successful attack to occur, the attacker needs to triage the environment to determine where the lockdown variable symbol is placed in memory when the kernel is loaded. Then the SSDT table needs to be written accordingly into this memory position and the grub.cfg file needs to be changed to load the table during the boot time.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7fwupdAffected
Red Hat Enterprise Linux 7fwupdateAffected
Red Hat Enterprise Linux 7shimNot affected
Red Hat Enterprise Linux 8fwupdateWill not fix
Red Hat Enterprise Linux 7grub2FixedRHSA-2021:069902.03.2021
Red Hat Enterprise Linux 7.2 Advanced Update Supportgrub2FixedRHSA-2021:070402.03.2021
Red Hat Enterprise Linux 7.3 Advanced Update Supportgrub2FixedRHSA-2021:070302.03.2021
Red Hat Enterprise Linux 7.4 Advanced Update Supportgrub2FixedRHSA-2021:070202.03.2021
Red Hat Enterprise Linux 7.4 Telco Extended Update Supportgrub2FixedRHSA-2021:070202.03.2021
Red Hat Enterprise Linux 7.4 Update Services for SAP Solutionsgrub2FixedRHSA-2021:070202.03.2021

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-184
https://bugzilla.redhat.com/show_bug.cgi?id=1873150grub2: acpi command allows privileged user to load crafted ACPI tables when Secure Boot is enabled

EPSS

Процентиль: 78%
0.0121
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 4 лет назад

A flaw was found in grub2 in versions prior to 2.06, where it incorrectly enables the usage of the ACPI command when Secure Boot is enabled. This flaw allows an attacker with privileged access to craft a Secondary System Description Table (SSDT) containing code to overwrite the Linux kernel lockdown variable content directly into memory. The table is further loaded and executed by the kernel, defeating its Secure Boot lockdown and allowing the attacker to load unsigned code. The highest threat from this vulnerability is to data confidentiality and integrity, as well as system availability.

CVSS3: 7.5
nvd
больше 4 лет назад

A flaw was found in grub2 in versions prior to 2.06, where it incorrectly enables the usage of the ACPI command when Secure Boot is enabled. This flaw allows an attacker with privileged access to craft a Secondary System Description Table (SSDT) containing code to overwrite the Linux kernel lockdown variable content directly into memory. The table is further loaded and executed by the kernel, defeating its Secure Boot lockdown and allowing the attacker to load unsigned code. The highest threat from this vulnerability is to data confidentiality and integrity, as well as system availability.

CVSS3: 7.5
msrc
больше 4 лет назад

Описание отсутствует

CVSS3: 7.5
debian
больше 4 лет назад

A flaw was found in grub2 in versions prior to 2.06, where it incorrec ...

CVSS3: 7.5
github
около 3 лет назад

A flaw was found in grub2 in versions prior to 2.06, where it incorrectly enables the usage of the ACPI command when Secure Boot is enabled. This flaw allows an attacker with privileged access to craft a Secondary System Description Table (SSDT) containing code to overwrite the Linux kernel lockdown variable content directly into memory. The table is further loaded and executed by the kernel, defeating its Secure Boot lockdown and allowing the attacker to load unsigned code. The highest threat from this vulnerability is to data confidentiality and integrity, as well as system availability.

EPSS

Процентиль: 78%
0.0121
Низкий

7.5 High

CVSS3