An authentication bypass flaw was found in GRUB due to the way that GRUB uses the UUID of a device to search for the configuration file that contains the password hash for the GRUB password protection feature. An attacker capable of attaching an external drive such as a USB stick containing a file system with a duplicate UUID (the same as in the "/boot/" file system) can bypass the GRUB password protection feature on UEFI systems, which enumerate removable drives before non-removable ones. This issue was introduced in a downstream patch in Red Hat's version of grub2 and does not affect the upstream package.
Metrics
Affected Vendors & Products
References
History
Fri, 22 Nov 2024 12:00:00 +0000
Wed, 13 Nov 2024 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 16 Sep 2024 17:45:00 +0000
MITRE
Status: PUBLISHED
Assigner: redhat
Published: 2024-01-15T11:10:19.517Z
Updated: 2024-11-24T11:54:07.154Z
Reserved: 2023-07-28T20:57:15.937Z
Link: CVE-2023-4001
Vulnrichment
Updated: 2024-08-02T07:17:10.437Z
NVD
Status : Modified
Published: 2024-01-15T11:15:08.270
Modified: 2024-11-21T08:34:11.900
Link: CVE-2023-4001
Redhat