Red Hat Enterprise Linux grub2 Package Secure Boot access control
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 5.7 | $0-$5k | 0.00 |
Summary
A vulnerability, which was classified as problematic, has been found in Red Hat Enterprise Linux. This impacts an unknown function of the component grub2 Package. This manipulation causes access control (Secure Boot). This vulnerability is tracked as CVE-2015-5281. No exploit exists. It is advisable to upgrade the affected component.
Details
A vulnerability was found in Red Hat Enterprise Linux (Operating System) (affected version unknown). It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component grub2 Package. The manipulation with an unknown input leads to a access control vulnerability (Secure Boot). The CWE definition for the vulnerability is CWE-264. As an impact it is known to affect confidentiality, integrity, and availability. The summary by CVE is:
The grub2 package before 2.02-0.29 in Red Hat Enterprise Linux (RHEL) 7, when used on UEFI systems, allows local users to bypass intended Secure Boot restrictions and execute non-verified code via a crafted (1) multiboot or (2) multiboot2 module in the configuration file or physically proximate attackers to bypass intended Secure Boot restrictions and execute non-verified code via the (3) boot menu.
The weakness was disclosed 11/24/2015 with Red Hat (Website). The advisory is shared at bugzilla.redhat.com. This vulnerability is known as CVE-2015-5281 since 07/01/2015. An attack has to be approached locally. The exploitation doesn't need any form of authentication. Neither technical details nor an exploit are publicly available. MITRE ATT&CK project uses the attack technique T1068 for this issue.
The vulnerability scanner Nessus provides a plugin with the ID 87039 (Oracle Linux 7 : grub2 (ELSA-2015-2401)), which helps to determine the existence of the flaw in a target environment. It is assigned to the family Oracle Linux Local Security Checks and running in the context l. The commercial vulnerability scanner Qualys is able to test this issue with plugin 124483 (CentOS Security Update for grub2 (CESA-2015:2401)).
Upgrading eliminates this vulnerability. A possible mitigation has been published before and not just after the disclosure of the vulnerability.
The vulnerability is also documented in the databases at Tenable (87039), SecurityFocus (BID 77983†) and Vulnerability Center (SBV-54560†). Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
Product
Type
Vendor
Name
License
Website
- Vendor: https://www.redhat.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.9VulDB Meta Temp Score: 5.7
VulDB Base Score: 5.9
VulDB Temp Score: 5.7
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Name: Secure BootClass: Access control / Secure Boot
CWE: CWE-264
CAPEC: 🔍
ATT&CK: 🔍
Physical: Partially
Local: Yes
Remote: No
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 87039
Nessus Name: Oracle Linux 7 : grub2 (ELSA-2015-2401)
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Context: 🔍
OpenVAS ID: 80056
OpenVAS Name: Oracle Linux Local Check: ELSA-2015-2401
OpenVAS File: 🔍
OpenVAS Family: 🔍
Qualys ID: 🔍
Qualys Name: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Timeline
07/01/2015 🔍11/19/2015 🔍
11/23/2015 🔍
11/23/2015 🔍
11/24/2015 🔍
11/24/2015 🔍
11/24/2015 🔍
11/24/2015 🔍
11/25/2015 🔍
11/23/2024 🔍
Sources
Vendor: redhat.comAdvisory: RHSA-2015:2401
Organization: Red Hat
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2015-5281 (🔍)
GCVE (CVE): GCVE-0-2015-5281
GCVE (VulDB): GCVE-100-79297
SecurityFocus: 77983 - GNU GRUB2 CVE-2015-5281 Local Security Bypass Vulnerability
SecurityTracker: 1034198
Vulnerability Center: 54560 - GNU GRUB2 Remote Security Bypass Vulnerability, Medium
Entry
Created: 11/25/2015 09:53Updated: 11/23/2024 22:18
Changes: 11/25/2015 09:53 (56), 04/18/2018 14:11 (17), 06/27/2022 16:28 (4), 11/23/2024 22:18 (20)
Complete: 🔍
Cache ID: 216::103
Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
No comments yet. Languages: en.
Please log in to comment.