Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-8105

Опубликовано: 25 июл. 2024
Источник: redhat
CVSS3: 8.2

Описание

A vulnerability related to the use an insecure Platform Key (PK) has been discovered. An attacker with the compromised PK private key can create malicious UEFI software that is signed with a trusted key that has been compromised.

The PKfail flaw was discovered in Secure Boot. It is a firmware supply-chain issue that affects hundreds of device models in the UEFI ecosystem. The Secure Boot "master key," known as the Platform Key, which manages the Secure Boot databases and maintains the chain of trust from firmware to the operating system, is often not replaced by OEMs or device vendors. This issue results in devices shipping with untrusted keys. This issue allows an attacker with access to the private part of the PK to bypass Secure Boot by manipulating the Key Exchange Key (KEK) database, the Signature Database (db), and the Forbidden Signature Database (dbx).

Отчет

PKFail is a supply chain security issue in which an untrusted private key is used for firmware development and production devices. This helps attackers perform malicious operations due to many devices in the field connected to the same leaked key, used across multiple vendors for cryptographic data preservation. These encryption keys should ideally assure platform security of devices secured with Secure Boot. This vulnerability could allow an attacker to sign device firmware that can bypass the protections that Secure Boot enables, compromising the trust chain of the device firmware and operating system. Only privileged user with physical access or root access can use UEFI-update to do this. We recommend upgrading system firmware (to the last), please contact your hardware vendor for further updates.

Меры по смягчению последствий

The fix for PKfail is straightforward: the compromised key needs to be replaced and device vendors need to ship a firmware update.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10kernelNot affected
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 7kernel-rtNot affected
Red Hat Enterprise Linux 8kernelNot affected
Red Hat Enterprise Linux 8kernel-rtNot affected
Red Hat Enterprise Linux 9kernelNot affected
Red Hat Enterprise Linux 9kernel-rtNot affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-1394
https://bugzilla.redhat.com/show_bug.cgi?id=2300165linux-firmware: PKfail secure boot bypass

8.2 High

CVSS3

Связанные уязвимости

CVSS3: 6.4
nvd
больше 1 года назад

A vulnerability related to the use an insecure Platform Key (PK) has been discovered. An attacker with the compromised PK private key can create malicious UEFI software that is signed with a trusted key that has been compromised.

CVSS3: 6.4
github
больше 1 года назад

A vulnerability related to the use an insecure Platform Key (PK) has been discovered. An attacker with the compromised PK private key can create malicious UEFI software that is signed with a trusted key that has been compromised.

CVSS3: 8.2
fstec
больше 1 года назад

Уязвимость микропрограммного обеспечения UEFI (BIOS), связанная с возможностью использования жёстко закодированных ключей платформы, позволяющая нарушителю выполнить произвольный код до загрузки операционной системы

8.2 High

CVSS3