CVE-2020-10759

A PGP signature bypass flaw was found in fwupd (all versions), which could lead to the installation of unsigned firmware. As per upstream, a signature bypass is theoretically possible, but not practical because the Linux Vendor Firmware Service (LVFS) is either not implemented or enabled in versions of fwupd shipped with Red Hat Enterprise Linux 7 and 8. The highest threat from this vulnerability is to confidentiality and integrity.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6 MEDIUM
LOCAL
LOW
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 3%
VendorProductVersion
redhatenterprise_linux
7.0
redhatenterprise_linux
8.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
fwupd
bullseye
1.5.7-4
fixed
bookworm
1.8.12-2
fixed
sid
1.9.26-2
fixed
trixie
1.9.26-2
fixed
libjcat
bullseye
0.1.3-2
fixed
bookworm
0.1.9-1
fixed
sid
0.2.0-2
fixed
trixie
0.2.0-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
fwupd
jammy
Fixed 1.3.10-1
released
impish
Fixed 1.3.10-1
released
hirsute
Fixed 1.3.10-1
released
groovy
Fixed 1.3.10-1
released
focal
Fixed 1.3.9-4ubuntu0.1
released
eoan
Fixed 1.2.10-1ubuntu4.1
released
bionic
Fixed 1.2.10-1ubuntu2~ubuntu18.04.5
released
xenial
Fixed 0.8.3-0ubuntu5.1
released
trusty
dne
libjcat
jammy
not-affected
impish
not-affected
hirsute
not-affected
groovy
not-affected
focal
not-affected
eoan
dne
bionic
dne
xenial
dne
trusty
dne