CVE-2023-4001

An authentication bypass flaw was found in GRUB due to the way that GRUB uses the UUID of a device to search for the configuration file that contains the password hash for the GRUB password protection feature. An attacker capable of attaching an external drive such as a USB stick containing a file system with a duplicate UUID (the same as in the "/boot/" file system) can bypass the GRUB password protection feature on UEFI systems, which enumerate removable drives before non-removable ones. This issue was introduced in a downstream patch in Red Hat's version of grub2 and does not affect the upstream package.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gnu:grub2:-:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*

History

21 Nov 2024, 08:34

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/01/15/3 -
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3OBADMKHQLJOBA32Q7XPNSYMVHVAFDCB/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CHLZQ47HM64NDOHMHYO7VIJFYD5ZPPYN/ -
  • () https://security.netapp.com/advisory/ntap-20240216-0006/ -
References () https://access.redhat.com/errata/RHSA-2024:0437 - () https://access.redhat.com/errata/RHSA-2024:0437 -
References () https://access.redhat.com/errata/RHSA-2024:0456 - () https://access.redhat.com/errata/RHSA-2024:0456 -
References () https://access.redhat.com/errata/RHSA-2024:0468 - () https://access.redhat.com/errata/RHSA-2024:0468 -
References () https://access.redhat.com/security/cve/CVE-2023-4001 - Third Party Advisory () https://access.redhat.com/security/cve/CVE-2023-4001 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2224951 - Issue Tracking, Vendor Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=2224951 - Issue Tracking, Vendor Advisory
References () https://dfir.ru/2024/01/15/cve-2023-4001-a-vulnerability-in-the-downstream-grub-boot-manager/ - Third Party Advisory () https://dfir.ru/2024/01/15/cve-2023-4001-a-vulnerability-in-the-downstream-grub-boot-manager/ - Third Party Advisory

16 Sep 2024, 17:16

Type Values Removed Values Added
References
  • {'url': 'http://www.openwall.com/lists/oss-security/2024/01/15/3', 'tags': ['Mailing List'], 'source': 'secalert@redhat.com'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3OBADMKHQLJOBA32Q7XPNSYMVHVAFDCB/', 'source': 'secalert@redhat.com'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CHLZQ47HM64NDOHMHYO7VIJFYD5ZPPYN/', 'source': 'secalert@redhat.com'}
  • {'url': 'https://security.netapp.com/advisory/ntap-20240216-0006/', 'source': 'secalert@redhat.com'}

16 Feb 2024, 13:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20240216-0006/ -

05 Feb 2024, 04:15

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CHLZQ47HM64NDOHMHYO7VIJFYD5ZPPYN/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3OBADMKHQLJOBA32Q7XPNSYMVHVAFDCB/ -

25 Jan 2024, 20:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:0468 -
  • () https://access.redhat.com/errata/RHSA-2024:0437 -
  • () https://access.redhat.com/errata/RHSA-2024:0456 -

23 Jan 2024, 19:29

Type Values Removed Values Added
First Time Redhat
Gnu grub2
Fedoraproject fedora
Fedoraproject
Gnu
Redhat enterprise Linux
CPE cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
cpe:2.3:a:gnu:grub2:-:*:*:*:*:*:*:*
References () https://bugzilla.redhat.com/show_bug.cgi?id=2224951 - () https://bugzilla.redhat.com/show_bug.cgi?id=2224951 - Issue Tracking, Vendor Advisory
References () https://access.redhat.com/security/cve/CVE-2023-4001 - () https://access.redhat.com/security/cve/CVE-2023-4001 - Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2024/01/15/3 - () http://www.openwall.com/lists/oss-security/2024/01/15/3 - Mailing List
References () https://dfir.ru/2024/01/15/cve-2023-4001-a-vulnerability-in-the-downstream-grub-boot-manager/ - () https://dfir.ru/2024/01/15/cve-2023-4001-a-vulnerability-in-the-downstream-grub-boot-manager/ - Third Party Advisory
CWE CWE-290
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.8

16 Jan 2024, 01:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/01/15/3 -

15 Jan 2024, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-15 11:15

Updated : 2024-11-21 08:34


NVD link : CVE-2023-4001

Mitre link : CVE-2023-4001

CVE.ORG link : CVE-2023-4001


JSON object : View

Products Affected

gnu

  • grub2

fedoraproject

  • fedora

redhat

  • enterprise_linux
CWE
CWE-290

Authentication Bypass by Spoofing