CVE-2020-10713
grub2: Crafted grub.cfg file can lead to arbitrary code execution during boot process
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A flaw was found in grub2, prior to version 2.06. An attacker may use the GRUB 2 flaw to hijack and tamper the GRUB verification process. This flaw also allows the bypass of Secure Boot protections. In order to load an untrusted or modified kernel, an attacker would first need to establish access to the system such as gaining physical access, obtain the ability to alter a pxe-boot network, or have remote access to a networked system with root access. With this access, an attacker could then craft a string to cause a buffer overflow by injecting a malicious payload that leads to arbitrary code execution within GRUB. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Se encontró un fallo en grub2, versiones anteriores a 2.06. Un atacante puede usar el fallo de GRUB 2 para secuestrar y manipular el proceso de verificación de GRUB. Este fallo también permite omitir las protecciones de Secure Boot. A fin de cargar un kernel no confiable o modificado, un atacante primero necesitaría establecer acceso al sistema, tal y como conseguir acceso físico, obtener la capacidad de alterar una red pxe-boot o tener acceso remoto a un sistema de red con acceso root. Con este acceso, un atacante podría diseñar una cadena para causar un desbordamiento del búfer al inyectar una carga útil maliciosa que conlleve a una ejecución de código arbitraria dentro de GRUB. La mayor amenaza de esta vulnerabilidad es la confidencialidad e integridad de los datos, así como la disponibilidad del sistema
A flaw was found in grub2, prior to version 2.06. An attacker may use the GRUB 2 flaw to hijack and tamper the GRUB verification process. This flaw also allows the bypass of Secure Boot protections. In order to load an untrusted or modified kernel, an attacker would first need to establish access to the system such as gaining physical access, obtain the ability to alter a pxe-boot network, or have remote access to a networked system with root access. With this access, an attacker could then craft a string to cause a buffer overflow by injecting a malicious payload that leads to arbitrary code execution within GRUB. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-03-20 CVE Reserved
- 2020-07-28 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-04 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
- CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CAPEC
References (15)
URL | Tag | Source |
---|---|---|
http://www.openwall.com/lists/oss-security/2020/07/29/3 | Mailing List | |
https://cve.openeuler.org/#/CVEInfo/CVE-2020-10713 | Broken Link | |
https://eclypsium.com/2020/07/29/theres-a-hole-in-the-boot | Technical Description | |
https://kb.vmware.com/s/article/80181 | Third Party Advisory | |
https://security.netapp.com/advisory/ntap-20200731-0008 | Third Party Advisory | |
https://www.kb.cert.org/vuls/id/174059 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Gnu Search vendor "Gnu" | Grub2 Search vendor "Gnu" for product "Grub2" | < 2.06 Search vendor "Gnu" for product "Grub2" and version " < 2.06" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 10.0 Search vendor "Debian" for product "Debian Linux" and version "10.0" | - |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Leap Search vendor "Opensuse" for product "Leap" | 15.1 Search vendor "Opensuse" for product "Leap" and version "15.1" | - |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Leap Search vendor "Opensuse" for product "Leap" | 15.2 Search vendor "Opensuse" for product "Leap" and version "15.2" | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Photon Os Search vendor "Vmware" for product "Photon Os" | < 2.0 Search vendor "Vmware" for product "Photon Os" and version " < 2.0" | - |
Affected
|