An insecure default to allow UEFI Shell in EDK2 was left enabled in Ubuntu's EDK2. This allows an OS-resident attacker to bypass Secure Boot.
References
| Link | Resource |
|---|---|
| https://bugs.launchpad.net/ubuntu/+source/edk2/+bug/2040137 | Issue Tracking |
| https://bugs.launchpad.net/ubuntu/+source/lxd/+bug/2040139 | Issue Tracking |
| https://lists.debian.org/debian-lts-announce/2024/06/msg00028.html | Mailing List |
| https://nvd.nist.gov/vuln/detail/CVE-2023-48733 | Third Party Advisory |
| https://www.openwall.com/lists/oss-security/2024/02/14/4 | Mailing List |
| https://bugs.launchpad.net/ubuntu/+source/edk2/+bug/2040137 | Issue Tracking |
| https://bugs.launchpad.net/ubuntu/+source/lxd/+bug/2040139 | Issue Tracking |
| https://lists.debian.org/debian-lts-announce/2024/06/msg00028.html | Mailing List |
| https://nvd.nist.gov/vuln/detail/CVE-2023-48733 | Third Party Advisory |
| https://www.openwall.com/lists/oss-security/2024/02/14/4 | Mailing List |
Configurations
History
No history.
Information
Published : 2024-02-14 22:15
Updated : 2025-08-26 17:19
NVD link : CVE-2023-48733
Mitre link : CVE-2023-48733
CVE.ORG link : CVE-2023-48733
JSON object : View
Products Affected
canonical
- lxd
tianocore
- edk2
debian
- debian_linux
CWE
CWE-1188
Initialization of a Resource with an Insecure Default
