CVE-2020-26200

A component of Kaspersky custom boot loader allowed loading of untrusted UEFI modules due to insufficient check of their authenticity. This component is incorporated in Kaspersky Rescue Disk (KRD) and was trusted by the Authentication Agent of Full Disk Encryption in Kaspersky Endpoint Security (KES). This issue allowed to bypass the UEFI Secure Boot security feature. An attacker would need physical access to the computer to exploit it. Otherwise, local administrator privileges would be required to modify the boot loader component.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:kaspersky:endpoint_security:10:sp2_mr2:*:*:*:*:*:*
cpe:2.3:a:kaspersky:endpoint_security:10:sp2_mr3:*:*:*:*:*:*
cpe:2.3:a:kaspersky:endpoint_security:11.0.0:*:*:*:*:*:*:*
cpe:2.3:a:kaspersky:endpoint_security:11.0.1:*:*:*:*:*:*:*
cpe:2.3:a:kaspersky:endpoint_security:11.1.0:*:*:*:*:*:*:*
cpe:2.3:a:kaspersky:rescue_disk:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:19

Type Values Removed Values Added
References () https://support.kaspersky.com/general/vulnerability.aspx?el=12430#170221 - Broken Link () https://support.kaspersky.com/general/vulnerability.aspx?el=12430#170221 - Broken Link

Information

Published : 2021-02-26 14:15

Updated : 2024-11-21 05:19


NVD link : CVE-2020-26200

Mitre link : CVE-2020-26200

CVE.ORG link : CVE-2020-26200


JSON object : View

Products Affected

kaspersky

  • endpoint_security
  • rescue_disk
CWE
CWE-287

Improper Authentication