Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-2486

Опубликовано: 26 нояб. 2025
Источник: redhat
CVSS3: 3.6
EPSS Низкий

Описание

The Ubuntu edk2 UEFI firmware packages accidentally allowed the UEFI Shell to be accessed in Secure Boot environments, possibly allowing bypass of Secure Boot constraints. Versions 2024.05-2ubuntu0.3 and 2024.02-2ubuntu0.3 disable the Shell. Some previous versions inserted a secure-boot-based decision to continue running inside the Shell itself, which is believed to be sufficient to enforce Secure Boot restrictions. This is an additional repair on top of the incomplete fix for CVE-2023-48733.

A flaw was found in edk2. This vulnerability allows bypass of Secure Boot (Unified Extensible Firmware Interface) constraints via accidentally allowing the UEFI Shell to be accessed in Secure Boot environments.

Отчет

This vulnerability doesn't affect any supported Red Hat products.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10edk2Not affected
Red Hat Enterprise Linux 8edk2Not affected
Red Hat Enterprise Linux 9edk2Not affected
Red Hat OpenShift Container Platform 4rhcosNot affected

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-489
https://bugzilla.redhat.com/show_bug.cgi?id=2417316edk2: edk2: UEFI Shell access in Secure Boot environments allows bypass of Secure Boot constraints

EPSS

Процентиль: 7%
0.00025
Низкий

3.6 Low

CVSS3

Связанные уязвимости

CVSS3: 8.8
ubuntu
4 месяца назад

The Ubuntu edk2 UEFI firmware packages accidentally allowed the UEFI Shell to be accessed in Secure Boot environments, possibly allowing bypass of Secure Boot constraints. Versions 2024.05-2ubuntu0.3 and 2024.02-2ubuntu0.3 disable the Shell. Some previous versions inserted a secure-boot-based decision to continue running inside the Shell itself, which is believed to be sufficient to enforce Secure Boot restrictions. This is an additional repair on top of the incomplete fix for CVE-2023-48733.

CVSS3: 8.8
nvd
4 месяца назад

The Ubuntu edk2 UEFI firmware packages accidentally allowed the UEFI Shell to be accessed in Secure Boot environments, possibly allowing bypass of Secure Boot constraints. Versions 2024.05-2ubuntu0.3 and 2024.02-2ubuntu0.3 disable the Shell. Some previous versions inserted a secure-boot-based decision to continue running inside the Shell itself, which is believed to be sufficient to enforce Secure Boot restrictions. This is an additional repair on top of the incomplete fix for CVE-2023-48733.

msrc
4 месяца назад

UEFI Shell accessible in AAVMF with Secure Boot enabled on Ubuntu

CVSS3: 8.8
debian
4 месяца назад

The Ubuntu edk2 UEFI firmware packages accidentally allowed the UEFI S ...

CVSS3: 8.8
github
4 месяца назад

The Ubuntu edk2 UEFI firmware packages accidentally allowed the UEFI Shell to be accessed in Secure Boot environments, possibly allowing bypass of Secure Boot constraints. Versions 2024.05-2ubuntu0.3 and 2024.02-2ubuntu0.3 disable the Shell. Some previous versions inserted a secure-boot-based decision to continue running inside the Shell itself, which is believed to be sufficient to enforce Secure Boot restrictions. This is an additional repair on top of the incomplete fix for CVE-2023-48733.

EPSS

Процентиль: 7%
0.00025
Низкий

3.6 Low

CVSS3