Boot Process Vulnerability in GRUB2 by Red Hat
CVE-2021-3418
6.4MEDIUM
Summary
The vulnerability in GRUB2 allows for potential unauthorized kernel execution by bypassing signature validation when certificates are improperly stored. This flaw enables an attacker to manipulate the boot process, resulting in a system that will incorrectly believe it is operating under secure boot mode, thereby enforcing lockdown measures. Systems running GRUB2 versions before 2.06, particularly those making use of the shim_lock mechanism, are at risk of this serious oversight, echoing an earlier security issue recorded in CVE-2020-15705.
Affected Version(s)
grub2 Fixed in 2.06
References
CVSS V3.1
Score:
6.4
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved