An authentication bypass flaw was found in GRUB due to the way that GRUB uses the UUID of a device to search for the configuration file that contains the password hash for the GRUB password protection feature. An attacker capable of attaching an external drive such as a USB stick containing a file system with a duplicate UUID (the same as in the "/boot/" file system) can bypass the GRUB password protection feature on UEFI systems, which enumerate removable drives before non-removable ones. This issue was introduced in a downstream patch in Red Hat's version of grub2 and does not affect the upstream package.
References
Configurations
History
21 Nov 2024, 08:34
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://access.redhat.com/errata/RHSA-2024:0437 - | |
References | () https://access.redhat.com/errata/RHSA-2024:0456 - | |
References | () https://access.redhat.com/errata/RHSA-2024:0468 - | |
References | () https://access.redhat.com/security/cve/CVE-2023-4001 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2224951 - Issue Tracking, Vendor Advisory | |
References | () https://dfir.ru/2024/01/15/cve-2023-4001-a-vulnerability-in-the-downstream-grub-boot-manager/ - Third Party Advisory |
16 Sep 2024, 17:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
16 Feb 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
05 Feb 2024, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Jan 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
23 Jan 2024, 19:29
Type | Values Removed | Values Added |
---|---|---|
First Time |
Redhat
Gnu grub2 Fedoraproject fedora Fedoraproject Gnu Redhat enterprise Linux |
|
CPE | cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:* cpe:2.3:a:gnu:grub2:-:*:*:*:*:*:*:* |
|
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2224951 - Issue Tracking, Vendor Advisory | |
References | () https://access.redhat.com/security/cve/CVE-2023-4001 - Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/01/15/3 - Mailing List | |
References | () https://dfir.ru/2024/01/15/cve-2023-4001-a-vulnerability-in-the-downstream-grub-boot-manager/ - Third Party Advisory | |
CWE | CWE-290 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.8 |
16 Jan 2024, 01:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
15 Jan 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-15 11:15
Updated : 2024-11-21 08:34
NVD link : CVE-2023-4001
Mitre link : CVE-2023-4001
CVE.ORG link : CVE-2023-4001
JSON object : View
Products Affected
gnu
- grub2
fedoraproject
- fedora
redhat
- enterprise_linux
CWE
CWE-290
Authentication Bypass by Spoofing