Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-3052

Опубликовано: 11 июн. 2025
Источник: redhat

Описание

An arbitrary write vulnerability in Microsoft signed UEFI firmware allows for code execution of untrusted software. This allows an attacker to control its value, leading to arbitrary memory writes, including modification of critical firmware settings stored in NVRAM. Exploiting this vulnerability could enable security bypasses, persistence mechanisms, or full system compromise.

Отчет

Red Hat components are not directly affected by CVE-2025-3052. However, until the DBX entries are updated on a system, it is possible for an attacker to boot the affected EFI applications even with secure boot protections enabled. Once the affected vendors have released a DBX update, it should be installed through fwupd via LVFS

Ссылки на источники

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=2364095vulnerable-uefi-module: Arbitrary write in UEFI module could lead to bypassing Secure Boot

Связанные уязвимости

CVSS3: 8.2
nvd
9 дней назад

An arbitrary write vulnerability in Microsoft signed UEFI firmware allows for code execution of untrusted software. This allows an attacker to control its value, leading to arbitrary memory writes, including modification of critical firmware settings stored in NVRAM. Exploiting this vulnerability could enable security bypasses, persistence mechanisms, or full system compromise.

CVSS3: 6.7
msrc
9 дней назад

Cert CC: CVE-2025-3052 InsydeH2O Secure Boot Bypass

CVSS3: 8.2
github
9 дней назад

An arbitrary write vulnerability in Microsoft signed UEFI firmware allows for code execution of untrusted software. This allows an attacker to control its value, leading to arbitrary memory writes, including modification of critical firmware settings stored in NVRAM. Exploiting this vulnerability could enable security bypasses, persistence mechanisms, or full system compromise.

CVSS3: 8.2
fstec
9 дней назад

Уязвимость реализации протокола безопасной загрузки Secure Boot операционной системы Windows, позволяющая нарушителю обойти существующие ограничения безопасности и выполнить произвольный код