CVE-2022-34302

A flaw was found in New Horizon Datasys bootloaders before 2022-06-01. An attacker may use this bootloader to bypass or tamper with Secure Boot protections. In order to load and execute arbitrary code in the pre-boot stage, an attacker simply needs to replace the existing signed bootloader currently in use with this bootloader. Access to the EFI System Partition is required for booting using external media.
Configurations

Configuration 1 (hide)

cpe:2.3:o:horizondatasys:uefi_bootloader:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:09

Type Values Removed Values Added
References () https://edk2-docs.gitbook.io/understanding-the-uefi-secure-boot-chain/secure_boot_chain_in_uefi/uefi_secure_boot - Third Party Advisory () https://edk2-docs.gitbook.io/understanding-the-uefi-secure-boot-chain/secure_boot_chain_in_uefi/uefi_secure_boot - Third Party Advisory
References () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01001.html - () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01001.html -
References () https://www.kb.cert.org/vuls/id/309662 - Third Party Advisory, US Government Resource () https://www.kb.cert.org/vuls/id/309662 - Third Party Advisory, US Government Resource

14 Nov 2023, 19:15

Type Values Removed Values Added
References
  • () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01001.html -

Information

Published : 2022-08-26 18:15

Updated : 2024-11-21 07:09


NVD link : CVE-2022-34302

Mitre link : CVE-2022-34302

CVE.ORG link : CVE-2022-34302


JSON object : View

Products Affected

microsoft

  • windows_rt_8.1
  • windows_server_2012
  • windows_8.1
  • windows_server_2019
  • windows_server_2016
  • windows_server_2022
  • windows_10
  • windows_11

redhat

  • enterprise_linux

horizondatasys

  • uefi_bootloader