CVE-2023-4001

An authentication bypass flaw was found in GRUB due to the way that GRUB uses the UUID of a device to search for the configuration file that contains the password hash for the GRUB password protection feature. An attacker capable of attaching an external drive such as a USB stick containing a file system with a duplicate UUID (the same as in the "/boot/" file system) can bypass the GRUB password protection feature on UEFI systems, which enumerate removable drives before non-removable ones. This issue was introduced in a downstream patch in Red Hat's version of grub2 and does not affect the upstream package.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gnu:grub2:-:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*

History

16 Sep 2024, 17:16

Type Values Removed Values Added
References
  • {'url': 'http://www.openwall.com/lists/oss-security/2024/01/15/3', 'tags': ['Mailing List'], 'source': 'secalert@redhat.com'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3OBADMKHQLJOBA32Q7XPNSYMVHVAFDCB/', 'source': 'secalert@redhat.com'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CHLZQ47HM64NDOHMHYO7VIJFYD5ZPPYN/', 'source': 'secalert@redhat.com'}
  • {'url': 'https://security.netapp.com/advisory/ntap-20240216-0006/', 'source': 'secalert@redhat.com'}

16 Feb 2024, 13:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20240216-0006/ -

05 Feb 2024, 04:15

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CHLZQ47HM64NDOHMHYO7VIJFYD5ZPPYN/ -

05 Feb 2024, 02:15

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3OBADMKHQLJOBA32Q7XPNSYMVHVAFDCB/ -

25 Jan 2024, 20:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:0456 -
  • () https://access.redhat.com/errata/RHSA-2024:0437 -
  • () https://access.redhat.com/errata/RHSA-2024:0468 -

23 Jan 2024, 19:29

Type Values Removed Values Added
References () https://bugzilla.redhat.com/show_bug.cgi?id=2224951 - () https://bugzilla.redhat.com/show_bug.cgi?id=2224951 - Issue Tracking, Vendor Advisory
References () http://www.openwall.com/lists/oss-security/2024/01/15/3 - () http://www.openwall.com/lists/oss-security/2024/01/15/3 - Mailing List
References () https://dfir.ru/2024/01/15/cve-2023-4001-a-vulnerability-in-the-downstream-grub-boot-manager/ - () https://dfir.ru/2024/01/15/cve-2023-4001-a-vulnerability-in-the-downstream-grub-boot-manager/ - Third Party Advisory
References () https://access.redhat.com/security/cve/CVE-2023-4001 - () https://access.redhat.com/security/cve/CVE-2023-4001 - Third Party Advisory
CWE CWE-290
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.8
CPE cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:a:gnu:grub2:-:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*

16 Jan 2024, 13:56

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-15 11:15

Updated : 2024-09-16 17:16


NVD link : CVE-2023-4001

Mitre link : CVE-2023-4001

CVE.ORG link : CVE-2023-4001


JSON object : View

Products Affected

fedoraproject

  • fedora

gnu

  • grub2

redhat

  • enterprise_linux
CWE
CWE-290

Authentication Bypass by Spoofing