8.2
CVSSv3

CVE-2020-25632

Published: 03/03/2021 Updated: 07/11/2023
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 8.2 | Impact Score: 6 | Exploitability Score: 1.5
VMScore: 646
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

A flaw was found in grub2 in versions before 2.06. The rmmod implementation allows the unloading of a module used as a dependency without checking if any other dependent module is still loaded leading to a use-after-free scenario. This could allow arbitrary code to be executed or a bypass of Secure Boot protections. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gnu grub2

redhat enterprise linux server aus 7.2

redhat enterprise linux workstation 7.0

redhat enterprise linux 7.0

redhat enterprise linux server aus 7.3

redhat enterprise linux server aus 7.4

redhat enterprise linux server tus 7.4

redhat enterprise linux server tus 7.6

redhat enterprise linux server eus 7.6

redhat enterprise linux server aus 7.6

redhat enterprise linux 8.0

redhat enterprise linux server eus 7.7

redhat enterprise linux server aus 7.7

redhat enterprise linux server tus 7.7

redhat enterprise linux server eus 8.1

redhat enterprise linux server tus 8.2

redhat enterprise linux server aus 8.2

fedoraproject fedora 33

fedoraproject fedora 34

netapp ontap select deploy administration utility -

Vendor Advisories

A flaw was found in grub2 The rmmod implementation allows the unloading of a module used as a dependency without checking if any other dependent module is still loaded leading to a use-after-free scenario This could allow arbitrary code to be executed or a bypass of Secure Boot protections The highest threat from this vulnerability is to data co ...
The rmmod implementation for grub2 is flawed, allowing an attacker to unload a module used as a dependency without checking if any other dependent module is still loaded This leads to a use-after-free scenario possibly allowing an attacker to execute arbitrary code and by-pass Secure Boot protections ...
Several vulnerabilities have been discovered in the GRUB2 bootloader CVE-2020-14372 It was discovered that the acpi command allows a privileged user to load crafted ACPI tables when Secure Boot is enabled CVE-2020-25632 A use-after-free vulnerability was found in the rmmod command CVE-2020-25647 An out-of-bound write vulnerabili ...
A flaw was found in GRUB 2, where it incorrectly enables the usage of the ACPI command when Secure Boot is enabled This flaw allows an attacker with privileged access to craft a Secondary System Description Table (SSDT) containing code to overwrite the Linux kernel lockdown variable content directly into memory The table is further loaded and exe ...
HP has been informed of a potential security vulnerability in GRUB2 bootloaders commonly used by Linux This vulnerability, known as “There’s a Hole in the Boot” (also nicknamed “BootHole”), could allow bypass of UEFI Secure Boot and allow arbitrary code execution Additional GRUB2 vulnerabilities found in response to the initial report ...
HP has been informed of a potential security vulnerability in GRUB2 bootloaders commonly used by Linux This vulnerability, known as “There’s a Hole in the Boot” (also nicknamed “BootHole”), could allow bypass of UEFI Secure Boot and allow arbitrary code execution Additional GRUB2 vulnerabilities found in response to the initial report ...

ICS Advisories

Hitachi Energy APM Edge
Critical Infrastructure Sectors: Energy

Github Repositories

This script will remediate the BootHole bug identified in CVE-2020-25632 and/or CVE-2021-20233.

Boot Hole Fix This script will remediate the BootHole bug identified in CVE-2020-25632 and/or CVE-2021-20233 On July 29, 2020, Microsoft published security advisory 200011 that describes a new vulnerability that's related to Secure Boot Devices that trust the Microsoft third-party Unified Extensible Firmware Interface (UEFI) Certificate Authority (CA) in their Secure Boo

This repo i s fo r review of requests for signing shim To create a request for review: clone this repo edit the template below add the shimefi to be signed add build logs add any additional binaries/certificates/SHA256 hashes that may be needed commit all of that tag it with a tag of the form "myorg-shim-arch-YYYYMMDD" push that to github file an issue at https:/

BitRaser OS shim review

This repo is for review of requests for signing shim To create a request for review: clone this repo edit the template below add the shimefi to be signed add build logs add any additional binaries/certificates/SHA256 hashes that may be needed commit all of that tag it with a tag of the form "myorg-shim-arch-YYYYMMDD" push that to github file an issue at gi

This repo is for review of requests for signing shim To create a request for review: clone this repo edit the template below add the shimefi to be signed add build logs add any additional binaries/certificates/SHA256 hashes that may be needed commit all of that tag it with a tag of the form "myorg-shim-arch-YYYYMMDD" push that to github file an issue at gi

What organization or people are asking to have this signed? MicroWorld Technologies Inc - wwwescanavcom What product or service is this for? eScan for Windows What's the justification that this really does need to be signed for the whole world to be able to boot it? eScan range of Security Solutions are used by millions of customers globally It has a feat

BitRaser OS shim review

This repo is for review of requests for signing shim To create a request for review: clone this repo edit the template below add the shimefi to be signed add build logs add any additional binaries/certificates/SHA256 hashes that may be needed commit all of that tag it with a tag of the form "myorg-shim-arch-YYYYMMDD" push that to github file an issue at gi

BootHole_Fix !!PLEASE READ!! Disclaimer - The code within this repository comes with no guarantee, the use of this code is your responsibility I take NO responsibility and/or liability for how you choose to use any of the source code available here By using any of the files available in this repository, you understand that you are AGREEING TO USE AT YOUR OWN RISK ALL files a

Reviews of shim

This repo is for review of requests for signing shim To create a request for review: clone this repo edit the template below add the shimefi to be signed add build logs add any additional binaries/certificates/SHA256 hashes that may be needed commit all of that tag it with a tag of the form "myorg-shim-arch-YYYYMMDD" push that to github file an issue at gi

Reviews of shim

This repo is for review of requests for signing shim To create a request for review: clone this repo edit the template below add the shimefi to be signed add build logs add any additional binaries/certificates/SHA256 hashes that may be needed commit all of that tag it with a tag of the form "myorg-shim-arch-YYYYMMDD" push that to github file an issue at gi

This repo is for review of requests for signing shim To create a request for review: clone this repo edit the template below add the shimefi to be signed add build logs add any additional binaries/certificates/SHA256 hashes that may be needed commit all of that tag it with a tag of the form "myorg-shim-arch-YYYYMMDD" push that to github file an issue at gi

UEFI shim review submission

This repo is for review of requests for signing shim To create a request for review: clone this repo edit the template below add the shimefi to be signed add build logs add any additional binaries/certificates/SHA256 hashes that may be needed commit all of that tag it with a tag of the form "myorg-shim-arch-YYYYMMDD" push that to github file an issue at gi

This repo is for review of requests for signing shim To create a request for review: clone this repo edit the template below add the shimefi to be signed add build logs add any additional binaries/certificates/SHA256 hashes that may be needed commit all of that tag it with a tag of the form "myorg-shim-arch-YYYYMMDD" push that to github file an issue at gi

shim-review for Navix

This repo is for review of requests for signing shim To create a request for review: clone this repo edit the template below add the shimefi to be signed add build logs add any additional binaries/certificates/SHA256 hashes that may be needed commit all of that tag it with a tag of the form "myorg-shim-arch-YYYYMMDD" push that to github file an issue at gi

shim-review for Navix

This repo is for review of requests for signing shim To create a request for review: clone this repo edit the template below add the shimefi to be signed add build logs add any additional binaries/certificates/SHA256 hashes that may be needed commit all of that tag it with a tag of the form "myorg-shim-arch-YYYYMMDD" push that to github file an issue at gi

This repo is for review of requests for signing shim To create a request for review: clone this repo edit the template below add the shimefi to be signed add build logs add any additional binaries/certificates/SHA256 hashes that may be needed commit all of that tag it with a tag of the form "myorg-shim-arch-YYYYMMDD" push that to github file an issue at gi

This repo is for review of requests for signing shim To create a request for review: clone this repo edit the template below add the shimefi to be signed add build logs add any additional binaries/certificates/SHA256 hashes that may be needed commit all of that tag it with a tag of the form "myorg-shim-arch-YYYYMMDD" push that to github file an issue at gi

This repo is for review of requests for signing shim To create a request for review: clone this repo edit the template below add the shimefi to be signed add build logs add any additional binaries/certificates/SHA256 hashes that may be needed commit all of that tag it with a tag of the form "myorg-shim-arch-YYYYMMDD" push that to github file an issue at gi

Reviews of shim

This repo is for review of requests for signing shim To create a request for review: clone this repo edit the template below add the shimefi to be signed add build logs add any additional binaries/certificates/SHA256 hashes that may be needed commit all of that tag it with a tag of the form "myorg-shim-arch-YYYYMMDD" push that to github file an issue at gi