CVSS3
Attack Vector
PHYSICAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
LOW
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:L
EPSS
Percentile
24.2%
efibootguard is a simple UEFI boot loader with support for safely switching
between current and updated partition sets. Insufficient or missing
validation and sanitization of input from untrustworthy bootloader
environment files can cause crashes and probably also code injections into
bg_setenv
) or programs using libebgenv
. This is triggered when the
affected components try to modify a manipulated environment, in particular
its user variables. Furthermore, bg_printenv
may crash over invalid read
accesses or report invalid results. Not affected by this issue is EFI Boot
Guard’s bootloader EFI binary. EFI Boot Guard release v0.15 contains
required patches to sanitize and validate the bootloader environment prior
to processing it in userspace. Its library and tools should be updated, so
should programs statically linked against it. An update of the bootloader
EFI executable is not required. The only way to prevent the issue with an
unpatched EFI Boot Guard version is to avoid accesses to user variables,
specifically modifications to them.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 24.04 | noarch | efibootguard | < any | UNKNOWN |
github.com/siemens/efibootguard/blob/master/docs/API.md
github.com/siemens/efibootguard/blob/master/docs/TOOLS.md
github.com/siemens/efibootguard/blob/master/docs/TOOLS.md#setting-user-variables
github.com/siemens/efibootguard/commit/53dee61dc8b3a83c882e4bc9a0cfe7d6d73610c4 (v0.15)
github.com/siemens/efibootguard/commit/965d65c5751898c4bb094ef191b7387819423414 (v0.15)
github.com/siemens/efibootguard/security/advisories/GHSA-j6pp-7g99-24m7
github.com/siemens/efibootguard/tags
launchpad.net/bugs/cve/CVE-2023-39950
nvd.nist.gov/vuln/detail/CVE-2023-39950
security-tracker.debian.org/tracker/CVE-2023-39950
www.cve.org/CVERecord?id=CVE-2023-39950