A PGP signature bypass flaw was found in fwupd (all versions), which could lead to the installation of unsigned firmware. As per upstream, a signature bypass is theoretically possible, but not practical because the Linux Vendor Firmware Service (LVFS) is either not implemented or enabled in versions of fwupd shipped with Red Hat Enterprise Linux 7 and 8. The highest threat from this vulnerability is to confidentiality and integrity.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1844316 | Issue Tracking Third Party Advisory |
https://github.com/justinsteven/advisories/blob/master/2020_fwupd_dangling_s3_bucket_and_CVE-2020-10759_signature_verification_bypass.md | Exploit Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1844316 | Issue Tracking Third Party Advisory |
https://github.com/justinsteven/advisories/blob/master/2020_fwupd_dangling_s3_bucket_and_CVE-2020-10759_signature_verification_bypass.md | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:56
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1844316 - Issue Tracking, Third Party Advisory | |
References | () https://github.com/justinsteven/advisories/blob/master/2020_fwupd_dangling_s3_bucket_and_CVE-2020-10759_signature_verification_bypass.md - Exploit, Third Party Advisory |
Information
Published : 2020-09-15 19:15
Updated : 2024-11-21 04:56
NVD link : CVE-2020-10759
Mitre link : CVE-2020-10759
CVE.ORG link : CVE-2020-10759
JSON object : View
Products Affected
redhat
- enterprise_linux
CWE
CWE-347
Improper Verification of Cryptographic Signature