First published: Wed Sep 20 2023(Updated: )
PCR14 is not in the list of PCRs that seal/unseal the “vault” key, but due to the change that was implemented in commit “7638364bc0acf8b5c481b5ce5fea11ad44ad7fd4”, fixing this issue alone would not solve the problem of the config partition not being measured correctly. Also, the “vault” key is sealed/unsealed with SHA1 PCRs instead of SHA256. This issue was somewhat mitigated due to all of the PCR extend functions updating both the values of SHA256 and SHA1 for a given PCR ID. However, due to the change that was implemented in commit “7638364bc0acf8b5c481b5ce5fea11ad44ad7fd4”, this is no longer the case for PCR14, as the code in “measurefs.go” explicitly updates only the SHA256 instance of PCR14, which means that even if PCR14 were to be added to the list of PCRs sealing/unsealing the “vault” key, changes to the config partition would still not be measured. An attacker could modify the config partition without triggering the measured boot, this could result in the attacker gaining full control over the device with full access to the contents of the encrypted “vault”
Credit: cve@asrg.io cve@asrg.io
Affected Software | Affected Version | How to fix |
---|---|---|
Linuxfoundation Edge Virtualization Engine | >=9.0.0<9.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-43630 is high.
The Linuxfoundation Edge Virtualization Engine versions between 9.0.0 and 9.5.0 are affected by CVE-2023-43630.
There is no known fix for CVE-2023-43630 at the moment. It is recommended to follow the guidance provided by the Linuxfoundation Edge Virtualization Engine or the security advisories.
The CWE of CVE-2023-43630 is 328, 522, 922.
You can find more information about CVE-2023-43630 in the following reference: [link](https://asrg.io/security-advisories/config-partition-not-measured-from-2-fronts/)