First published: Mon Oct 22 2018(Updated: )
A logic error in MdeModulePkg in EDK II firmware may allow authenticated user to potentially bypass configuration access controls and escalate privileges via local access. External Reference: <a href="https://edk2-docs.gitbooks.io/security-advisory/content/edk-ii-authenticated-variable-bypass.html">https://edk2-docs.gitbooks.io/security-advisory/content/edk-ii-authenticated-variable-bypass.html</a> Upstream Bug: <a href="https://bugzilla.tianocore.org/show_bug.cgi?id=415">https://bugzilla.tianocore.org/show_bug.cgi?id=415</a>
Affected Software | Affected Version | How to fix |
---|---|---|
TianoCore EDK II |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1641433 is classified as high due to the potential for authenticated users to bypass configuration access controls.
To resolve REDHAT-BUG-1641433, update to the latest version of the TianoCore EDK II firmware that addresses this vulnerability.
Users of TianoCore EDK II firmware who have authenticated access are affected by REDHAT-BUG-1641433.
REDHAT-BUG-1641433 can potentially be exploited for privilege escalation and unauthorized access by authenticated users.
Currently, there are no known effective workarounds for REDHAT-BUG-1641433; updating the firmware is the recommended action.