Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-2296

Опубликовано: 09 дек. 2025
Источник: redhat
CVSS3: 8.2

Описание

EDK2 contains a vulnerability in BIOS where an attacker may cause “ Improper Input Validation” by local access. Successful exploitation of this vulnerability could alter control flow in unexpected ways, potentially allowing arbitrary command execution and impacting Confidentiality, Integrity, and Availability.

A flaw was found in EDK2 (EFI Development Kit 2). This vulnerability allows an attacker to cause arbitrary command execution and impact Confidentiality, Integrity, and Availability via improper input validation by local access.

Отчет

This vulnerability is considered Important because it compromises a key security control in the boot chain, Secure Boot enforcement—by allowing an unsigned kernel to be loaded through the legacy fallback path when direct-boot signature verification fails. Although exploitation requires high privileges, the flaw enables a reliable and unintended bypass of a protection mechanism explicitly designed to prevent unauthorized code from executing during early boot. This loss of integrity in a security-critical stage gives attackers the opportunity to introduce persistent modifications, tamper with system state, or load manipulated kernels outside the trusted key database. The impact is therefore more significant than a moderate flaw, as it affects a foundational trust anchor rather than a user-space component, and can meaningfully weaken the platform’s security posture even under restricted privilege conditions.

Меры по смягчению последствий

To reduce the risk by disabling direct-boot mode, ensuring all bootable kernels are signed and present in the Secure Boot DB, and restricting privileged access to prevent attackers from introducing unsigned payloads.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10edk2Affected
Red Hat Enterprise Linux 8edk2Affected
Red Hat Enterprise Linux 9edk2Affected
Red Hat OpenShift Container Platform 4rhcosWill not fix

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=2420637edk2: EDK2: Improper Input Validation allows arbitrary command execution

8.2 High

CVSS3

Связанные уязвимости

ubuntu
4 месяца назад

EDK2 contains a vulnerability in BIOS where an attacker may cause “ Improper Input Validation” by local access. Successful exploitation of this vulnerability could alter control flow in unexpected ways, potentially allowing arbitrary command execution and impacting Confidentiality, Integrity, and Availability.

nvd
4 месяца назад

EDK2 contains a vulnerability in BIOS where an attacker may cause “ Improper Input Validation” by local access. Successful exploitation of this vulnerability could alter control flow in unexpected ways, potentially allowing arbitrary command execution and impacting Confidentiality, Integrity, and Availability.

CVSS3: 8.2
msrc
4 месяца назад

Un-verified kernel bypass Secure Boot mechanism in direct boot mode

debian
4 месяца назад

EDK2 contains a vulnerability in BIOS where an attacker may cause \u20 ...

github
4 месяца назад

EDK2 contains a vulnerability in BIOS where an attacker may cause “ Improper Input Validation” by local access. Successful exploitation of this vulnerability could alter control flow in unexpected ways, potentially allowing arbitrary command execution and impacting Confidentiality, Integrity, and Availability.

8.2 High

CVSS3