CVE-2020-15705 PUBLISHED

GRUB2 fails to validate kernel signature when booted directly without shim, allowing secure boot to be bypassed. This only affects systems where the kernel signing certificate has been imported directly into the secure boot database and the GRUB image is booted directly without the use of shim. This issue affects GRUB2 version 2.04 and prior versions.

EPSS 0.03% · 9.3th percentile

Risk Scores

EPSS Score
0.03%
9.3th percentile

Affected Products

VendorProductVersions
Ubuntu:16.04:LTSgrub22.02~beta2-29, 2.02~beta2-36ubuntu3.15, 2.02~beta2-36ubuntu3.14
Ubuntu:18.04:LTSgrub2-signed1.93.16, 1.93.15, 1.93.14
Ubuntu:18.04:LTSgrub22.02-2ubuntu8.3, 0, 2.02~beta3-4ubuntu7
Ubuntu:16.04:LTSgrub2-signed1.58, 1.59, 1.61
Ubuntu:Pro:14.04:LTSgrub2-signed1.30, 1.27, 1.26
Ubuntu:Pro:14.04:LTSgrub22.02~beta2-9ubuntu1.1, 2.02~beta2-6, 2.02~beta2-5
Ubuntu:20.04:LTSgrub22.04-1ubuntu20, 2.04-1ubuntu18, 2.04-1ubuntu16
Ubuntu:16.04:LTSgrub2-unsigned2.04-1ubuntu44, 0, 2.04-1ubuntu44.1
Ubuntu:20.04:LTSgrub2-signed1.133, 1.134, 1.142.1

Timeline

References

Open in Interactive Console →