// For flags

CVE-2024-2312

 

Severity Score

6.7
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

GRUB2 does not call the module fini functions on exit, leading to Debian/Ubuntu's peimage GRUB2 module leaving UEFI system table hooks after exit. This lead to a use-after-free condition, and could possibly lead to secure boot bypass.

GRUB2 no llama a las funciones fini del módulo al salir, lo que hace que el módulo peimage GRUB2 de Debian/Ubuntu deje los ganchos de la tabla del sistema UEFI después de la salida. Esto conduce a una condición de use-after-free y posiblemente podría conducir a una omisión de arranque segura.

*Credits: Mate Kukri
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
None
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2024-03-07 CVE Reserved
  • 2024-04-05 CVE Published
  • 2024-04-27 EPSS Updated
  • 2024-08-29 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-416: Use After Free
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Debian
Search vendor "Debian"
Debian Based GNU GRUB
Search vendor "Debian" for product "Debian Based GNU GRUB"
< 2.12-1ubuntu5
Search vendor "Debian" for product "Debian Based GNU GRUB" and version " < 2.12-1ubuntu5"
en
Affected