Authentication Bypass Affecting grub2-pc-modules package, versions <1:2.06-61.el9_2.2


Severity

Recommended
0.0
medium
0
10

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.06% (27th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL9-GRUB2PCMODULES-6193211
  • published26 Jan 2024
  • disclosed9 Jan 2024

Introduced: 9 Jan 2024

CVE-2023-4001  (opens in a new tab)
CWE-290  (opens in a new tab)

How to fix?

Upgrade RHEL:9 grub2-pc-modules to version 1:2.06-61.el9_2.2 or higher.
This issue was patched in RHSA-2024:0456.

NVD Description

Note: Versions mentioned in the description apply only to the upstream grub2-pc-modules package and not the grub2-pc-modules package as distributed by RHEL. See How to fix? for RHEL:9 relevant fixed versions and status.

An authentication bypass flaw was found in GRUB due to the way that GRUB uses the UUID of a device to search for the configuration file that contains the password hash for the GRUB password protection feature. An attacker capable of attaching an external drive such as a USB stick containing a file system with a duplicate UUID (the same as in the "/boot/" file system) can bypass the GRUB password protection feature on UEFI systems, which enumerate removable drives before non-removable ones. This issue was introduced in a downstream patch in Red Hat's version of grub2 and does not affect the upstream package.

CVSS Scores

version 3.1