An insecure default to allow UEFI Shell in EDK2 was left enabled in LXD. This allows an OS-resident attacker to bypass Secure Boot.
References
| Link | Resource |
|---|---|
| https://bugs.launchpad.net/ubuntu/+source/edk2/+bug/2040137 | Issue Tracking |
| https://bugs.launchpad.net/ubuntu/+source/lxd/+bug/2040139 | Issue Tracking |
| https://nvd.nist.gov/vuln/detail/CVE-2023-48733 | Third Party Advisory |
| https://www.openwall.com/lists/oss-security/2024/02/14/4 | Mailing List |
| https://bugs.launchpad.net/ubuntu/+source/edk2/+bug/2040137 | Issue Tracking |
| https://bugs.launchpad.net/ubuntu/+source/lxd/+bug/2040139 | Issue Tracking |
| https://nvd.nist.gov/vuln/detail/CVE-2023-48733 | Third Party Advisory |
| https://www.openwall.com/lists/oss-security/2024/02/14/4 | Mailing List |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-02-14 22:15
Updated : 2025-08-26 17:19
NVD link : CVE-2023-49721
Mitre link : CVE-2023-49721
CVE.ORG link : CVE-2023-49721
JSON object : View
Products Affected
canonical
- lxd
tianocore
- edk2
CWE
CWE-276
Incorrect Default Permissions
