iTnews Asia
  • Home
  • News
  • Security

Bootloader bug exposes Linux secure boot

Bootloader bug exposes Linux secure boot

"Complete system compromise".

By Richard Chirgwin on Feb 8, 2024 10:59AM

Microsoft’s vulnerability and mitigations team have discovered a bug in a program called Shim, which is used in Linux distributions that support secure boot.

While the vulnerability, CVE-2023-40547, was first disclosed by Shim maintainer Red Hat on January 23, it has mostly flown under the radar.

The remote code execution vulnerability is because “Shim boot support trusts attacker-controlled values when parsing an HTTP response,” the advisory states.

“This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise.”

As security company Eclypsium explains, the bug could be exploited remotely in a man-in-the-middle attack, if the attacker can intercept traffic between the victim and the HTTP server supporting network boot.

A local attacker could manipulate the boot order to load a vulnerable version of Shim; while an attacker on the same network could “manipulate PXE to chain-load a vulnerable Shim bootloader, Eclypsium said.

Because the attacker can control the system before the kernel is loaded, they have privileged access and “the ability to circumvent any controls implemented by the kernel and operating system”.

While Red Hat is Shim’s maintainer, the software is used by any Linux distribution with secure boot support, including Ubuntu, Debian, Rocky, AlmaLinux, OpenSuse and Oracle Linux.

The upstream fix is in Shim 15.8 at GitHub.

To reach the editorial team on your feedback, story ideas and pitches, contact them here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
linux secure boot security shim

Related Articles

  • The best way to outsmart your threat actors is to think like one
  • How cybercriminals are exploiting LLMs to harm your business
  • Is identity now the next parameter of cybersecurity breaches?
  • Cybersecurity threats CISOs should be most worried about in 2025
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

The best way to outsmart your threat actors is to think like one

The best way to outsmart your threat actors is to think like one

What are the most pressing cyber security concerns going into 2025?

What are the most pressing cyber security concerns going into 2025?

Malaysia ramps up cyber security defense to stem rising fraud and ransomware attacks

Malaysia ramps up cyber security defense to stem rising fraud and ransomware attacks

How cybercriminals are exploiting LLMs to harm your business

How cybercriminals are exploiting LLMs to harm your business

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of Lighthouse Independent Media's Privacy Policy and Terms & Conditions.