8.2 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
4.6 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
0.001 Low
EPSS
Percentile
28.2%
A flaw was found in grub2, prior to version 2.06. An attacker may use the
GRUB 2 flaw to hijack and tamper the GRUB verification process. This flaw
also allows the bypass of Secure Boot protections. In order to load an
untrusted or modified kernel, an attacker would first need to establish
access to the system such as gaining physical access, obtain the ability to
alter a pxe-boot network, or have remote access to a networked system with
root access. With this access, an attacker could then craft a string to
cause a buffer overflow by injecting a malicious payload that leads to
arbitrary code execution within GRUB. The highest threat from this
vulnerability is to data confidentiality and integrity as well as system
availability.
Author | Note |
---|---|
alexmurray | grub2-signed is not supported in Ubuntu 12.04 ESM (precise/esm) and so marking the priority for grub2 in this release as low |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | grub2 | < 2.02-2ubuntu8.16 | UNKNOWN |
ubuntu | 20.04 | noarch | grub2 | < 2.04-1ubuntu26.1 | UNKNOWN |
ubuntu | 14.04 | noarch | grub2 | < 2.02~beta2-9ubuntu1.20) Available with Ubuntu Pro or Ubuntu Pro (Infra-only | UNKNOWN |
ubuntu | 16.04 | noarch | grub2 | < 2.02~beta2-36ubuntu3.26 | UNKNOWN |
ubuntu | 20.04 | noarch | grub2-signed | < 1.142.3 | UNKNOWN |
ubuntu | 18.04 | noarch | grub2-signed | < 1.93.18 | UNKNOWN |
ubuntu | 14.04 | noarch | grub2-signed | < 1.34.22) Available with Ubuntu Pro or Ubuntu Pro (Infra-only | UNKNOWN |
ubuntu | 16.04 | noarch | grub2-signed | < 1.66.26 | UNKNOWN |
ubuntu | 16.04 | noarch | grub2-unsigned | < any | UNKNOWN |
ubuntu | 18.04 | noarch | grub2-unsigned | < 2.04-1ubuntu47.4 | UNKNOWN |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10713
launchpad.net/bugs/cve/CVE-2020-10713
lists.gnu.org/archive/html/grub-devel/2020-07/msg00034.html
nvd.nist.gov/vuln/detail/CVE-2020-10713
security-tracker.debian.org/tracker/CVE-2020-10713
ubuntu.com/security/notices/USN-4432-1
wiki.ubuntu.com/SecurityTeam/KnowledgeBase/GRUB2SecureBootBypass
www.eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/
www.openwall.com/lists/oss-security/2020/07/29/3
8.2 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
4.6 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
0.001 Low
EPSS
Percentile
28.2%