Rapid7 Vulnerability & Exploit Database

Red Hat: CVE-2020-10713: Crafted grub.cfg file can lead to arbitrary code execution during boot process (Multiple Advisories)

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Red Hat: CVE-2020-10713: Crafted grub.cfg file can lead to arbitrary code execution during boot process (Multiple Advisories)



A flaw was found in grub2, prior to version 2.06. An attacker may use the GRUB 2 flaw to hijack and tamper the GRUB verification process. This flaw also allows the bypass of Secure Boot protections. In order to load an untrusted or modified kernel, an attacker would first need to establish access to the system such as gaining physical access, obtain the ability to alter a pxe-boot network, or have remote access to a networked system with root access. With this access, an attacker could then craft a string to cause a buffer overflow by injecting a malicious payload that leads to arbitrary code execution within GRUB. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.


  • redhat-upgrade-fwupd
  • redhat-upgrade-fwupd-debuginfo
  • redhat-upgrade-fwupd-debugsource
  • redhat-upgrade-fwupdate
  • redhat-upgrade-fwupdate-debuginfo
  • redhat-upgrade-fwupdate-devel
  • redhat-upgrade-fwupdate-efi
  • redhat-upgrade-fwupdate-libs
  • redhat-upgrade-grub2
  • redhat-upgrade-grub2-common
  • redhat-upgrade-grub2-debuginfo
  • redhat-upgrade-grub2-debugsource
  • redhat-upgrade-grub2-efi-aa64-modules
  • redhat-upgrade-grub2-efi-ia32
  • redhat-upgrade-grub2-efi-ia32-cdboot
  • redhat-upgrade-grub2-efi-ia32-modules
  • redhat-upgrade-grub2-efi-x64
  • redhat-upgrade-grub2-efi-x64-cdboot
  • redhat-upgrade-grub2-efi-x64-modules
  • redhat-upgrade-grub2-pc
  • redhat-upgrade-grub2-pc-modules
  • redhat-upgrade-grub2-ppc-modules
  • redhat-upgrade-grub2-ppc64-modules
  • redhat-upgrade-grub2-ppc64le-modules
  • redhat-upgrade-grub2-tools
  • redhat-upgrade-grub2-tools-debuginfo
  • redhat-upgrade-grub2-tools-efi
  • redhat-upgrade-grub2-tools-efi-debuginfo
  • redhat-upgrade-grub2-tools-extra
  • redhat-upgrade-grub2-tools-extra-debuginfo
  • redhat-upgrade-grub2-tools-minimal
  • redhat-upgrade-grub2-tools-minimal-debuginfo
  • redhat-upgrade-mokutil
  • redhat-upgrade-mokutil-debuginfo
  • redhat-upgrade-shim-ia32
  • redhat-upgrade-shim-unsigned-aa64-debuginfo
  • redhat-upgrade-shim-unsigned-ia32
  • redhat-upgrade-shim-unsigned-ia32-debuginfo
  • redhat-upgrade-shim-unsigned-x64
  • redhat-upgrade-shim-unsigned-x64-debuginfo
  • redhat-upgrade-shim-x64

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center