Show filters
171 Total Results
Displaying 51-60 of 171
Sort by:
Attacker Value
Unknown
CVE-2024-1598
Disclosure Date: May 14, 2024 (last updated May 15, 2024)
Potential buffer overflow
in unsafe UEFI variable handling
in Phoenix SecureCore™ for Intel Gemini Lake.This issue affects:
SecureCore™ for Intel Gemini Lake: from 4.1.0.1 before 4.1.0.567.
0
Attacker Value
Unknown
CVE-2024-0762
Disclosure Date: May 14, 2024 (last updated May 15, 2024)
Potential buffer overflow
in unsafe UEFI variable handling
in Phoenix SecureCore™ for select Intel platforms
This issue affects:
Phoenix
SecureCore™ for Intel Kaby Lake: from 4.0.1.1 before 4.0.1.998;
Phoenix
SecureCore™ for Intel Coffee Lake: from 4.1.0.1 before 4.1.0.562;
Phoenix
SecureCore™ for Intel Ice Lake: from 4.2.0.1 before 4.2.0.323;
Phoenix
SecureCore™ for Intel Comet Lake: from 4.2.1.1 before 4.2.1.287;
Phoenix
SecureCore™ for Intel Tiger Lake: from 4.3.0.1 before 4.3.0.236;
Phoenix
SecureCore™ for Intel Jasper Lake: from 4.3.1.1 before 4.3.1.184;
Phoenix
SecureCore™ for Intel Alder Lake: from 4.4.0.1 before 4.4.0.269;
Phoenix
SecureCore™ for Intel Raptor Lake: from 4.5.0.1 before 4.5.0.218;
Phoenix
SecureCore™ for Intel Meteor Lake: from 4.5.1.1 before 4.5.1.15.
0
Attacker Value
Unknown
CVE-2023-52080
Disclosure Date: April 29, 2024 (last updated April 30, 2024)
IEIT NF5280M6 UEFI firmware through 8.4 has a pool overflow vulnerability, caused by improper use of the gRT->GetVariable() function. Attackers with access to local NVRAM variables can exploit this by modifying these variables on SPI Flash, resulting in memory data being tampered with. When critical data in memory data is tampered with,a crash may occur.
0
Attacker Value
Unknown
CVE-2024-2312
Disclosure Date: April 05, 2024 (last updated April 10, 2024)
GRUB2 does not call the module fini functions on exit, leading to Debian/Ubuntu's peimage GRUB2 module leaving UEFI system table hooks after exit. This lead to a use-after-free condition, and could possibly lead to secure boot bypass.
0
Attacker Value
Unknown
CVE-2023-49721
Disclosure Date: February 14, 2024 (last updated February 15, 2024)
An insecure default to allow UEFI Shell in EDK2 was left enabled in LXD. This allows an OS-resident attacker to bypass Secure Boot.
0
Attacker Value
Unknown
CVE-2023-48733
Disclosure Date: February 14, 2024 (last updated February 15, 2024)
An insecure default to allow UEFI Shell in EDK2 was left enabled in Ubuntu's EDK2. This allows an OS-resident attacker to bypass Secure Boot.
0
Attacker Value
Unknown
CVE-2023-4001
Disclosure Date: January 15, 2024 (last updated April 25, 2024)
An authentication bypass flaw was found in GRUB due to the way that GRUB uses the UUID of a device to search for the configuration file that contains the password hash for the GRUB password protection feature. An attacker capable of attaching an external drive such as a USB stick containing a file system with a duplicate UUID (the same as in the "/boot/" file system) can bypass the GRUB password protection feature on UEFI systems, which enumerate removable drives before non-removable ones. This issue was introduced in a downstream patch in Red Hat's version of grub2 and does not affect the upstream package.
0
Attacker Value
Unknown
CVE-2023-40238
Disclosure Date: December 07, 2023 (last updated December 13, 2023)
A LogoFAIL issue was discovered in BmpDecoderDxe in Insyde InsydeH2O with kernel 5.2 before 05.28.47, 5.3 before 05.37.47, 5.4 before 05.45.47, 5.5 before 05.53.47, and 5.6 before 05.60.47 for certain Lenovo devices. Image parsing of crafted BMP logo files can copy data to a specific address during the DXE phase of UEFI execution. This occurs because of an integer signedness error involving PixelHeight and PixelWidth during RLE4/RLE8 compression.
0
Attacker Value
Unknown
CVE-2023-33017
Disclosure Date: December 05, 2023 (last updated December 12, 2023)
Memory corruption in Boot while running a ListVars test in UEFI Menu during boot.
0
Attacker Value
Unknown
CVE-2023-28737
Disclosure Date: November 14, 2023 (last updated November 21, 2023)
Improper initialization in some Intel(R) Aptio* V UEFI Firmware Integrator Tools may allow an authenticated user to potentially enable escalation of privilege via local access.
0