CVE-2020-10713

Description from NVD

A flaw was found in grub2, prior to version 2.06. An attacker may use the GRUB 2 flaw to hijack and tamper the GRUB verification process. This flaw also allows the bypass of Secure Boot protections. In order to load an untrusted or modified kernel, an attacker would first need to establish access to the system such as gaining physical access, obtain the ability to alter a pxe-boot network, or have remote access to a networked system with root access. With this access, an attacker could then craft a string to cause a buffer overflow by injecting a malicious payload that leads to arbitrary code execution within GRUB. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Information Acquisition Date:2021-04-27T10:49Z
CVSS 2.0: 4.6 MEDIUM CVSS 3.x: 8.2 HIGH

▼ CVSS3 Vec CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

▼ CVSS2 Vec AV:L/AC:L/Au:N/C:P/I:P/A:P

NVD References

 https://bugzilla.redhat.com/show_bug.cgi?id=1825243
     source:MISC
     tags:Issue Tracking    Third Party Advisory    
 VU#174059
     source:CERT-VN
     tags:Third Party Advisory    US Government Resource    
 https://security.netapp.com/advisory/ntap-20200731-0008/
     source:CONFIRM
     tags:Third Party Advisory    
 USN-4432-1
     source:UBUNTU
     tags:Third Party Advisory    
 20200804 GRUB2 Arbitrary Code Execution Vulnerability
     source:CISCO
     tags:Third Party Advisory    
 openSUSE-SU-2020:1169
     source:SUSE
     tags:
 openSUSE-SU-2020:1168
     source:SUSE
     tags:
 https://eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/
     source:MISC
     tags:
 [oss-security] 20200729 multiple secure boot grub2 and linux kernel vulnerabilities
     source:MLIST
     tags:
 DSA-4735
     source:DEBIAN
     tags:
 https://kb.vmware.com/s/article/80181
     source:MISC
     tags:
 https://cve.openeuler.org/#/CVEInfo/CVE-2020-10713
     source:MISC
     tags:

Refer to Information on External Sites

CVE InfomationExploits or more Infomation
mitreEXPLOIT DATABASE
NVD0day.today
vulmon.comgithub
CVE DetailsTwitter
JVN ENG JPN
Reconshell

Software Tag: Linux(2 tweets)



List of frequently cited URLs

URLNum of Times Referred to
https://alerts.vulmon.com/?utm_source=twitter&utm_medium=so...253
https://lists.astaro.com/ASGV9-IPS-rules.html15
https://us-cert.cisa.gov/ncas/current-activity/2020/07/30/g...7
https://access.redhat.com/security/vulnerabilities/grub2boo...5
https://security.sios.com/vulnerability/misc-security-vulne...5
https://www.helpnetsecurity.com/2020/07/30/cve-2020-10713/5
https://twitter.com/TheHackersNews/status/12885557504495329284
https://capsule8.com/blog/grubbing-secure-boot-the-wrong-wa...4
https://blog.qualys.com/vulnerabilities-research/2020/08/03...4
https://ift.tt/3077gAu3
https://ubuntu.com/blog/mitigating-boothole-theres-a-hole-i...3
https://eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/3
https://www.ubuntu.com/blog/mitigating-boothole-theres-a-ho...3
https://www.tenable.com/blog/cve-2020-10713-boothole-grub2-...3
https://blogs.oracle.com/linux/cve-2020-10713-grub2-boothole3
https://thehackernews.com/2020/07/grub2-bootloader-vulnerab...3
http://www.tuxmachines.org/node/1404253
https://www.securityweek.com/cybersecurity-agencies-warn-hi...3

Information from Twitter

User URL Info Source Date
threatintelctr https://nvd.nist.gov/vuln/detail/CVE-2020-10713 Source threatintelctr   1592735920767356929 2022/11/16
threatintelctr https://nvd.nist.gov/vuln/detail/CVE-2020-10713 Source threatintelctr   1592743469969453057 2022/11/16
threatintelctr https://nvd.nist.gov/vuln/detail/CVE-2020-10713 Source threatintelctr   1592758576493142016 2022/11/16
WolfgangSesin http://www.sesin.at Source WolfgangSesin    1592765775793766400 2022/11/16
WolfgangSesin https://www.sesin.at/2022/11/16/cve-2020-10713-debian_linux... Source WolfgangSesin    1592765775793766400 2022/11/16
www_sesin_at http://www.sesin.at Source www_sesin_at     1592765777819713536 2022/11/16
www_sesin_at https://www.sesin.at/2022/11/16/cve-2020-10713-debian_linux... Source www_sesin_at     1592765777819713536 2022/11/16
LinInfoSec https://bugzilla.redhat.com/show_bug.cgi?id=1825243 Source LinInfoSec       1592774788220608512 2022/11/16

List of frequently cited URLs

URLNum of Times Referred to
alerts.vulmon.com253
lists.astaro.com15
us-cert.cisa.gov7
access.redhat.com5
security.sios.com5
www.helpnetsecurity.com5
twitter.com4
capsule8.com4
blog.qualys.com4
ift.tt3
ubuntu.com3
eclypsium.com3
www.ubuntu.com3
www.tenable.com3
blogs.oracle.com3
thehackernews.com3
www.tuxmachines.org3
www.securityweek.com3

Information from Twitter

User URL Info Source
threatintelctr nvd.nist.gov Show Tweet
threatintelctr nvd.nist.gov Show Tweet
threatintelctr nvd.nist.gov Show Tweet
WolfgangSesin sesin.at Show Tweet
WolfgangSesin sesin.at Show Tweet
www_sesin_at sesin.at Show Tweet
www_sesin_at sesin.at Show Tweet
LinInfoSec bugzilla.redhat.com Show Tweet

GitHub Search Results: Up to 10
NameURL
No Data

GitHub Search Results: Up to 10
NameURL
No Data

2022/11/16 Score : 6
Added Har-sia Database : 2020/07/30
Last Modified : 2022/11/16
Highest Scored Date : 2020/07/30
Highest Score : 108