CVE-2020-15706
moderate-risk
Published 2020-07-29
GRUB2 contains a race condition in grub_script_function_create() leading to a use-after-free vulnerability which can be triggered by redefining a function whilst the same function is already executing, leading to arbitrary code execution and secure boot restriction bypass. This issue affects GRUB2 version 2.04 and prior versions.
Do I need to act?
-
0.05% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.4/10
Medium
LOCAL
/ HIGH complexity
Affected Products (20)
References (34)
Third Party Advisory
http://ubuntu.com/security/notices/USN-4432-1
Third Party Advisory
https://access.redhat.com/security/vulnerabilities/grub2bootloader
Third Party Advisory
https://security.gentoo.org/glsa/202104-05
Third Party Advisory
https://security.netapp.com/advisory/ntap-20200731-0008/
Third Party Advisory
https://usn.ubuntu.com/4432-1/
Third Party Advisory
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/GRUB2SecureBootBypass
Third Party Advisory
https://www.debian.org/security/2020-GRUB-UEFI-SecureBoot
Third Party Advisory
https://www.debian.org/security/2020/dsa-4735
Third Party Advisory
https://www.eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/
Third Party Advisory
https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/
Third Party Advisory
https://www.suse.com/support/kb/doc/?id=000019673
Third Party Advisory
http://ubuntu.com/security/notices/USN-4432-1
and 14 more references
40
/ 100
moderate-risk
Severity
17/34 · Moderate
Exploitability
0/34 · Minimal
Exposure
23/34 · High