A PGP signature bypass flaw was found in fwupd (all versions), which could lead to the installation of unsigned firmware. As per upstream, a signature bypass is theoretically possible, but not practical because the Linux Vendor Firmware Service (LVFS) is either not implemented or enabled in versions of fwupd shipped with Red Hat Enterprise Linux 7 and 8. The highest threat from this vulnerability is to confidentiality and integrity.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1844316 | Issue Tracking Third Party Advisory |
https://github.com/justinsteven/advisories/blob/master/2020_fwupd_dangling_s3_bucket_and_CVE-2020-10759_signature_verification_bypass.md | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2020-09-15 12:15
Updated : 2023-02-12 15:39
NVD link : CVE-2020-10759
Mitre link : CVE-2020-10759
JSON object : View
CWE
CWE-347
Improper Verification of Cryptographic Signature
Products Affected
redhat
- enterprise_linux