First published: Tue Aug 23 2022(Updated: )
A flaw was found in New Horizon Datasys bootloaders before 2022-06-01. An attacker may use this bootloader to bypass or tamper with Secure Boot protections. In order to load and execute arbitrary code in the pre-boot stage, an attacker simply needs to replace the existing signed bootloader currently in use with this bootloader. Access to the EFI System Partition is required for booting using external media.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Horizondatasys Uefi Bootloader | <2022-06-01 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =9.0 | |
Microsoft Windows 10 | ||
Microsoft Windows 10 | =20h2 | |
Microsoft Windows 10 | =21h1 | |
Microsoft Windows 10 | =21h2 | |
Microsoft Windows 10 | =1607 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows 11 | ||
Microsoft Windows 8.1 | ||
Microsoft Windows RT 8.1 | ||
Microsoft Windows Server 2012 | ||
Microsoft Windows Server 2012 | =r2 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2016 | =20h2 | |
Microsoft Windows Server 2019 | ||
Microsoft Windows Server 2022 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-34302 is a vulnerability found in New Horizon Datasys bootloaders that allows an attacker to bypass or tamper with Secure Boot protections.
CVE-2022-34302 affects various operating systems, including Horizondatasys Uefi Bootloader, Redhat Enterprise Linux, and Microsoft Windows 10, 11, and Server versions.
The severity of CVE-2022-34302 is medium, with a CVSS score of 6.7.
An attacker can exploit CVE-2022-34302 by replacing the existing signed bootloader to load and execute arbitrary code in the pre-boot stage.
A fix for CVE-2022-34302 may be provided by the software vendor or developer, and users should apply the latest patches or updates as soon as they are available.