CVE-2020-25647
moderate-risk
Published 2021-03-03
A flaw was found in grub2 in versions prior to 2.06. During USB device initialization, descriptors are read with very little bounds checking and assumes the USB device is providing sane values. If properly exploited, an attacker could trigger memory corruption leading to arbitrary code execution allowing a bypass of the Secure Boot mechanism. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Do I need to act?
-
0.01% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.6/10
High
PHYSICAL
/ LOW complexity
Affected Products (20)
Affected Vendors
References (8)
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1886936
Third Party Advisory
https://security.gentoo.org/glsa/202104-05
Third Party Advisory
https://security.netapp.com/advisory/ntap-20220325-0001/
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1886936
Third Party Advisory
https://security.gentoo.org/glsa/202104-05
Third Party Advisory
https://security.netapp.com/advisory/ntap-20220325-0001/
44
/ 100
moderate-risk
Severity
24/34 · High
Exploitability
0/34 · Minimal
Exposure
20/34 · Moderate