CVE-2022-34303

A flaw was found in Eurosoft bootloaders before 2022-06-01. An attacker may use this bootloader to bypass or tamper with Secure Boot protections. In order to load and execute arbitrary code in the pre-boot stage, an attacker simply needs to replace the existing signed bootloader currently in use with this bootloader. Access to the EFI System Partition is required for booting using external media.
Configurations

Configuration 1 (hide)

cpe:2.3:o:eurosoft-uk:uefi_bootloader:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:09

Type Values Removed Values Added
References () https://edk2-docs.gitbook.io/understanding-the-uefi-secure-boot-chain/secure_boot_chain_in_uefi/uefi_secure_boot - Third Party Advisory () https://edk2-docs.gitbook.io/understanding-the-uefi-secure-boot-chain/secure_boot_chain_in_uefi/uefi_secure_boot - Third Party Advisory
References () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01001.html - () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01001.html -
References () https://www.kb.cert.org/vuls/id/309662 - Third Party Advisory, US Government Resource () https://www.kb.cert.org/vuls/id/309662 - Third Party Advisory, US Government Resource

14 Nov 2023, 19:15

Type Values Removed Values Added
References
  • () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01001.html -

Information

Published : 2022-08-26 18:15

Updated : 2024-11-21 07:09


NVD link : CVE-2022-34303

Mitre link : CVE-2022-34303

CVE.ORG link : CVE-2022-34303


JSON object : View

Products Affected

microsoft

  • windows_rt_8.1
  • windows_server_2012
  • windows_8.1
  • windows_10
  • windows_server_2019
  • windows_server_2016
  • windows_server_2022
  • windows_11

eurosoft-uk

  • uefi_bootloader

redhat

  • enterprise_linux