CVE-2020-10759

EUVD-2020-3175
A PGP signature bypass flaw was found in fwupd (all versions), which could lead to the installation of unsigned firmware. As per upstream, a signature bypass is theoretically possible, but not practical because the Linux Vendor Firmware Service (LVFS) is either not implemented or enabled in versions of fwupd shipped with Red Hat Enterprise Linux 7 and 8. The highest threat from this vulnerability is to confidentiality and integrity.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6 MEDIUM
LOCAL
LOW
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: Unknown
Affected Products (NVD)
VendorProductVersion
redhatenterprise_linux
7.0
redhatenterprise_linux
8.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
fwupd
bookworm
1.8.12-2
fixed
bullseye
1.5.7-4
fixed
sid
1.9.26-2
fixed
trixie
1.9.26-2
fixed
libjcat
bookworm
0.1.9-1
fixed
bullseye
0.1.3-2
fixed
sid
0.2.0-2
fixed
trixie
0.2.0-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
fwupd
bionic
Fixed 1.2.10-1ubuntu2~ubuntu18.04.5
released
eoan
Fixed 1.2.10-1ubuntu4.1
released
focal
Fixed 1.3.9-4ubuntu0.1
released
groovy
Fixed 1.3.10-1
released
hirsute
Fixed 1.3.10-1
released
impish
Fixed 1.3.10-1
released
jammy
Fixed 1.3.10-1
released
trusty
dne
xenial
Fixed 0.8.3-0ubuntu5.1
released
libjcat
bionic
dne
eoan
dne
focal
not-affected
groovy
not-affected
hirsute
not-affected
impish
not-affected
jammy
not-affected
trusty
dne
xenial
dne