First published: Tue Aug 23 2022(Updated: )
A flaw was found in Eurosoft bootloaders before 2022-06-01. An attacker may use this bootloader to bypass or tamper with Secure Boot protections. In order to load and execute arbitrary code in the pre-boot stage, an attacker simply needs to replace the existing signed bootloader currently in use with this bootloader. Access to the EFI System Partition is required for booting using external media.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Eurosoft-uk Uefi Bootloader | <2022-06-01 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =9.0 | |
Microsoft Windows 10 | ||
Microsoft Windows 10 | =20h2 | |
Microsoft Windows 10 | =21h1 | |
Microsoft Windows 10 | =21h2 | |
Microsoft Windows 10 | =1607 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows 11 | ||
Microsoft Windows 8.1 | ||
Microsoft Windows RT 8.1 | ||
Microsoft Windows Server 2012 | ||
Microsoft Windows Server 2012 | =r2 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2016 | =20h2 | |
Microsoft Windows Server 2019 | ||
Microsoft Windows Server 2022 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-34303 is a vulnerability found in Eurosoft bootloaders before 2022-06-01 that allows an attacker to bypass or tamper with Secure Boot protections.
CVE-2022-34303 allows an attacker to load and execute arbitrary code in the pre-boot stage of Eurosoft bootloaders by replacing the existing signed bootloader.
Eurosoft-uk Uefi Bootloader before 2022-06-01, Redhat Enterprise Linux 7.0, 8.0, 9.0, Microsoft Windows 10, 20h2, 21h1, 21h2, 1607, 1809, 11, 8.1, RT 8.1, Server 2012, 2016, 2019, and 2022 are affected by CVE-2022-34303.
The severity of CVE-2022-34303 is medium with a CVSS score of 6.7.
To fix CVE-2022-34303, users should update Eurosoft bootloaders to a version released after 2022-06-01 and follow any security advisories or patches provided by the affected software vendors.