Lucene search

K
cve[email protected]CVE-2023-4692
HistoryOct 25, 2023 - 6:17 p.m.

CVE-2023-4692

2023-10-2518:17:41
CWE-787
CWE-122
web.nvd.nist.gov
409
cve-2023-4692
out-of-bounds write
grub2
ntfs filesystem
arbitrary code execution
secure boot protection bypass
nvd

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

An out-of-bounds write flaw was found in grub2’s NTFS filesystem driver. This issue may allow an attacker to present a specially crafted NTFS filesystem image, leading to grub’s heap metadata corruption. In some circumstances, the attack may also corrupt the UEFI firmware heap metadata. As a result, arbitrary code execution and secure boot protection bypass may be achieved.

Affected configurations

NVD
Node
gnugrub2Range<2.12
Node
redhatenterprise_linuxMatch8.0
OR
redhatenterprise_linuxMatch9.0
CPENameOperatorVersion
gnu:grub2gnu grub2lt2.12

CNA Affected

[
  {
    "versions": [
      {
        "status": "unaffected",
        "version": "2.12",
        "lessThan": "*",
        "versionType": "custom"
      }
    ],
    "packageName": "grub",
    "collectionURL": "https://git.savannah.gnu.org/git/grub.git/"
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat Enterprise Linux 8",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "grub2",
    "defaultStatus": "affected",
    "versions": [
      {
        "version": "1:2.02-156.el8",
        "lessThan": "*",
        "versionType": "rpm",
        "status": "unaffected"
      }
    ],
    "cpes": [
      "cpe:/o:redhat:enterprise_linux:8::baseos"
    ]
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat Enterprise Linux 9",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "grub2",
    "defaultStatus": "affected",
    "versions": [
      {
        "version": "1:2.06-77.el9",
        "lessThan": "*",
        "versionType": "rpm",
        "status": "unaffected"
      }
    ],
    "cpes": [
      "cpe:/o:redhat:enterprise_linux:9::baseos"
    ]
  },
  {
    "vendor": "Red Hat",
    "product": "Red Hat Enterprise Linux 7",
    "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
    "packageName": "grub2",
    "defaultStatus": "unknown",
    "cpes": [
      "cpe:/o:redhat:enterprise_linux:7"
    ]
  }
]

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%