vulnerability
Red Hat: CVE-2023-40547: shim: RCE in http boot support may lead to Secure Boot bypass (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:A/AC:H/Au:N/C:C/I:C/A:C) | 01/25/2024 | 04/17/2024 | 09/03/2024 |
Severity
7
CVSS
(AV:A/AC:H/Au:N/C:C/I:C/A:C)
Published
01/25/2024
Added
04/17/2024
Modified
09/03/2024
Description
A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. This flaw is only exploitable during the early boot phase, an attacker needs to perform a Man-in-the-Middle or compromise the boot server to be able to exploit this vulnerability successfully.
Solution(s)
redhat-upgrade-mokutilredhat-upgrade-mokutil-debuginforedhat-upgrade-shim-ia32redhat-upgrade-shim-unsigned-ia32redhat-upgrade-shim-unsigned-x64redhat-upgrade-shim-x64

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.