Lucene search

K
ciscoCiscoCISCO-SA-20200219-UCS-BOOT-BYPASS
HistoryFeb 19, 2020 - 4:00 p.m.

Multiple Cisco UCS-Based Products UEFI Secure Boot Bypass Vulnerability

2020-02-1916:00:00
tools.cisco.com
30

EPSS

0

Percentile

12.6%

A vulnerability in the firmware of the Cisco UCS C-Series Rack Servers could allow an authenticated, physical attacker to bypass Unified Extensible Firmware Interface (UEFI) Secure Boot validation checks and load a compromised software image on an affected device.

The vulnerability is due to improper validation of the server firmware upgrade images. An attacker could exploit this vulnerability by installing a server firmware version that would allow the attacker to disable UEFI Secure Boot. A successful exploit could allow the attacker to bypass the signature validation checks that are done by UEFI Secure Boot technology and load a compromised software image on the affected device. A compromised software image is any software image that has not been digitally signed by Cisco.

There are no workarounds that address this vulnerability. Cisco has released firmware updates that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200219-ucs-boot-bypass [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200219-ucs-boot-bypass”]

Affected configurations

Vulners
Node
ciscoidentity_services_engine_softwareMatchany
OR
ciscounified_computing_systemMatchany
OR
ciscoidentity_services_engine_softwareMatchany
OR
ciscounified_computing_systemMatchany
VendorProductVersionCPE
ciscoidentity_services_engine_softwareanycpe:2.3:a:cisco:identity_services_engine_software:any:*:*:*:*:*:*:*
ciscounified_computing_systemanycpe:2.3:h:cisco:unified_computing_system:any:*:*:*:*:*:*:*

EPSS

0

Percentile

12.6%

Related for CISCO-SA-20200219-UCS-BOOT-BYPASS