CVE-2023-48733

An insecure default to allow UEFI Shell in EDK2 was left enabled in Ubuntu's EDK2. This allows an OS-resident attacker to bypass Secure Boot.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.7 MEDIUM
LOCAL
LOW
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
canonicalCNA
6.7 MEDIUM
LOCAL
LOW
HIGH
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 1%
VendorProductVersion
canonicallxd
5.0:candidate
canonicallxd
5.21:candidate
canonicallxd
5.21:edge
tianocoreedk2
𝑥
≤ 2023.11-8
debiandebian_linux
10.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
edk2
bullseye (security)
2020.11-2+deb11u2
fixed
bullseye
2020.11-2+deb11u2
fixed
bookworm
2022.11-6+deb12u1
fixed
bookworm (security)
2022.11-6+deb12u1
fixed
trixie
2024.11-2
fixed
sid
2024.11-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
edk2
oracular
Fixed 2023.11-7
released
noble
Fixed 2023.11-7
released
mantic
Fixed 2023.05-2ubuntu0.1
released
lunar
ignored
jammy
Fixed 2022.02-3ubuntu0.22.04.2
released
focal
Fixed 0~20191122.bd85bf54-2ubuntu3.5
released
bionic
needs-triage
xenial
needs-triage
trusty
ignored