First published: Fri Feb 26 2021(Updated: )
A component of Kaspersky custom boot loader allowed loading of untrusted UEFI modules due to insufficient check of their authenticity. This component is incorporated in Kaspersky Rescue Disk (KRD) and was trusted by the Authentication Agent of Full Disk Encryption in Kaspersky Endpoint Security (KES). This issue allowed to bypass the UEFI Secure Boot security feature. An attacker would need physical access to the computer to exploit it. Otherwise, local administrator privileges would be required to modify the boot loader component.
Credit: vulnerability@kaspersky.com
Affected Software | Affected Version | How to fix |
---|---|---|
Kaspersky Endpoint Security for Windows | =10-sp2_mr2 | |
Kaspersky Endpoint Security for Windows | =10-sp2_mr3 | |
Kaspersky Endpoint Security for Windows | =11.0.0 | |
Kaspersky Endpoint Security for Windows | =11.0.1 | |
Kaspersky Endpoint Security for Windows | =11.1.0 | |
Kaspersky Rescue Disk | <18.0.11.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-26200 has been assigned a high severity rating due to its potential to allow loading of untrusted UEFI modules.
To fix CVE-2020-26200, update affected Kaspersky software to the latest version that addresses this vulnerability.
CVE-2020-26200 affects Kaspersky Endpoint Security versions 10 and 11 as well as Kaspersky Rescue Disk versions up to 18.0.11.3.
CVE-2020-26200 may allow an attacker to execute untrusted code during the startup process by bypassing authenticity checks.
Currently, the best workaround for CVE-2020-26200 is to ensure your Kaspersky software is fully updated and monitor for any patches provided by Kaspersky.