In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Arbitrary Command Injection vulnerabilities in an interactive lesson.
Start learningUpgrade nitro-tpm-pcr-compute to version 1.1.0 or higher.
Affected versions of this package are vulnerable to Arbitrary Command Injection via UefiData. An account operator with the ability to modify UefiData can alter kernel command line parameters and potentially bypass root filesystem integrity validation by modifying boot variables if PCR12 validation is not enforced in KMS policies. This is only exploitable if UEFI Secure Boot is disabled and KMS policies do not validate PCR12 or PCR7.
This vulnerability can be mitigated by manually adding PCR12 with a static zero value to AWS KMS key policies or by enabling and validating UEFI Secure Boot.