Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2023-4001
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Grub2: bypass the grub password protection feature
Source: NVD (National Vulnerability Database)
Vulnerability Description
An authentication bypass flaw was found in GRUB due to the way that GRUB uses the UUID of a device to search for the configuration file that contains the password hash for the GRUB password protection feature. An attacker capable of attaching an external drive such as a USB stick containing a file system with a duplicate UUID (the same as in the "/boot/" file system) can bypass the GRUB password protection feature on UEFI systems, which enumerate removable drives before non-removable ones. This issue was introduced in a downstream patch in Red Hat's version of grub2 and does not affect the upstream package.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
使用欺骗进行的认证绕过
Source: NVD (National Vulnerability Database)
Vulnerability Title
grub2 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
grub2是美国GNU社区的一款Linux系统引导程序。 grub2 存在安全漏洞,该漏洞源于GRUB 使用设备的 UUID 来搜索包含 GRUB 密码保护功能的密码哈希的配置文件,导致身份验证绕过缺陷,攻击者利用该漏洞可以绕过 UEFI 系统上的 GRUB 密码保护功能。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
Red HatRed Hat Enterprise Linux 9 1:2.06-70.el9_3.2 ~ * cpe:/o:redhat:enterprise_linux:9::baseos
Red HatRed Hat Enterprise Linux 9.0 Extended Update Support 1:2.06-27.el9_0.16 ~ * cpe:/o:redhat:rhel_eus:9.0::baseos
Red HatRed Hat Enterprise Linux 9.2 Extended Update Support 1:2.06-61.el9_2.2 ~ * cpe:/o:redhat:rhel_eus:9.2::baseos
Red HatRed Hat Enterprise Linux 8-cpe:/o:redhat:enterprise_linux:8
II. Public POCs for CVE-2023-4001
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2023-4001
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2023-4001

No comments yet


Leave a comment