An insecure default to allow UEFI Shell in EDK2 was left enabled in LXD. This allows an OS-resident attacker to bypass Secure Boot.
References
Link | Resource |
---|---|
https://bugs.launchpad.net/ubuntu/+source/edk2/+bug/2040137 | Issue Tracking |
https://bugs.launchpad.net/ubuntu/+source/lxd/+bug/2040139 | Issue Tracking |
https://nvd.nist.gov/vuln/detail/CVE-2023-48733 | Third Party Advisory |
https://www.openwall.com/lists/oss-security/2024/02/14/4 | Mailing List |
https://bugs.launchpad.net/ubuntu/+source/edk2/+bug/2040137 | Issue Tracking |
https://bugs.launchpad.net/ubuntu/+source/lxd/+bug/2040139 | Issue Tracking |
https://nvd.nist.gov/vuln/detail/CVE-2023-48733 | Third Party Advisory |
https://www.openwall.com/lists/oss-security/2024/02/14/4 | Mailing List |
Configurations
Configuration 1 (hide)
|
History
26 Aug 2025, 17:19
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugs.launchpad.net/ubuntu/+source/edk2/+bug/2040137 - Issue Tracking | |
References | () https://bugs.launchpad.net/ubuntu/+source/lxd/+bug/2040139 - Issue Tracking | |
References | () https://nvd.nist.gov/vuln/detail/CVE-2023-48733 - Third Party Advisory | |
References | () https://www.openwall.com/lists/oss-security/2024/02/14/4 - Mailing List | |
CPE | cpe:2.3:a:canonical:lxd:*:*:*:*:*:*:*:* cpe:2.3:a:tianocore:edk2:*:-:*:*:*:*:*:* |
|
First Time |
Canonical
Tianocore Tianocore edk2 Canonical lxd |
Information
Published : 2024-02-14 22:15
Updated : 2025-08-26 17:19
NVD link : CVE-2023-49721
Mitre link : CVE-2023-49721
CVE.ORG link : CVE-2023-49721
JSON object : View
Products Affected
canonical
- lxd
tianocore
- edk2
CWE
CWE-276
Incorrect Default Permissions