Lucene search

K
ubuntucveUbuntu.comUB:CVE-2020-10759
HistoryJun 09, 2020 - 12:00 a.m.

CVE-2020-10759

2020-06-0900:00:00
ubuntu.com
ubuntu.com
14

CVSS2

3.3

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:M/Au:N/C:P/I:P/A:N

CVSS3

6

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N

EPSS

0.001

Percentile

18.0%

A PGP signature bypass flaw was found in fwupd (all versions), which could
lead to the installation of unsigned firmware. As per upstream, a signature
bypass is theoretically possible, but not practical because the Linux
Vendor Firmware Service (LVFS) is either not implemented or enabled in
versions of fwupd shipped with Red Hat Enterprise Linux 7 and 8. The
highest threat from this vulnerability is to confidentiality and integrity.

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchfwupd< 1.2.10-1ubuntu2~ubuntu18.04.5UNKNOWN
ubuntu19.10noarchfwupd< 1.2.10-1ubuntu4.1UNKNOWN
ubuntu20.04noarchfwupd< 1.3.9-4ubuntu0.1UNKNOWN
ubuntu20.10noarchfwupd< 1.3.10-1UNKNOWN
ubuntu21.04noarchfwupd< 1.3.10-1UNKNOWN
ubuntu21.10noarchfwupd< 1.3.10-1UNKNOWN
ubuntu22.04noarchfwupd< 1.3.10-1UNKNOWN
ubuntu16.04noarchfwupd< 0.8.3-0ubuntu5.1UNKNOWN

CVSS2

3.3

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:M/Au:N/C:P/I:P/A:N

CVSS3

6

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N

EPSS

0.001

Percentile

18.0%