First published: Wed Feb 14 2024(Updated: )
An insecure default to allow UEFI Shell in EDK2 was left enabled in Ubuntu's EDK2. This allows an OS-resident attacker to bypass Secure Boot.
Credit: security@ubuntu.com security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/edk2 | <=0~20181115.85588389-3+deb10u3<=2020.11-2+deb11u1<=2022.11-6 | 2020.11-2+deb11u2 2022.11-6+deb12u1 2024.02-2 |
ubuntu/edk2 | <0~20191122. | 0~20191122. |
ubuntu/edk2 | <2022.02-3ubuntu0.22.04.2 | 2022.02-3ubuntu0.22.04.2 |
ubuntu/edk2 | <2023.05-2ubuntu0.1 | 2023.05-2ubuntu0.1 |
ubuntu/edk2 | <2023.11-7 | 2023.11-7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-48733 is considered a high severity vulnerability as it allows an OS-resident attacker to bypass Secure Boot.
To fix CVE-2023-48733, upgrade your edk2 package to the remedied versions specified for your distribution.
CVE-2023-48733 affects specific versions of the edk2 package in Debian and Ubuntu, including versions up to 2020.11-2+deb11u1 for Debian and 0~20191122 for Ubuntu Focal.
CVE-2023-48733 impacts systems running vulnerable versions of the edk2 package in Ubuntu and Debian distributions.
Currently, there are no effective workarounds for CVE-2023-48733 other than upgrading to the secure versions of the edk2 package.