An insecure default to allow UEFI Shell in EDK2 was left enabled in Ubuntu's EDK2. This allows an OS-resident attacker to bypass Secure Boot.
The product initializes or sets a resource with a default that is intended to be changed by the administrator, but the default is not secure.
Link | Tags |
---|---|
https://bugs.launchpad.net/ubuntu/+source/edk2/+bug/2040137 | issue tracking |
https://nvd.nist.gov/vuln/detail/CVE-2023-48733 | issue tracking |
https://www.openwall.com/lists/oss-security/2024/02/14/4 | mailing list |
https://bugs.launchpad.net/ubuntu/+source/lxd/+bug/2040139 | issue tracking |
https://lists.debian.org/debian-lts-announce/2024/06/msg00028.html |