Critical Vulnerability in Shim Bootloader Threatens Linux Systems

by | Feb 8, 2024 | News




Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes

A critical vulnerability discovered in the Shim Linux bootloader has sent shockwaves through the Linux community, exposing systems to the risk of pre-kernel code execution and potential takeover by attackers.

Tracked as CVE-2023-40547, the flaw was unearthed by Microsoft security researcher Bill Demirkapi on January 24, 2024, and was quickly recognized as a significant threat.

Shim, an essential component designed by Red Hat to facilitate Secure Boot on UEFI-based systems, inadvertently harbors this vulnerability in its httpboot.c source code, enabling attackers to trigger an out-of-bounds write by manipulating HTTP responses.

See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses




Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

Eclypsium’s recent report further underscores the severity of the issue, revealing multiple exploitation paths that span remote, local, and network-adjacent attack vectors.

To mitigate the risk, RedHat has released a code commit to address CVE-2023-40547, urging Linux distributions reliant on Shim—such as Red Hat, Debian, Ubuntu, and SUSE—to promptly push their patches.

Linux users are strongly advised to update to Shim version 15.8, which not only patches CVE-2023-40547 but also addresses five other significant vulnerabilities.




Additionally, to ensure comprehensive protection, users must update the UEFI Secure Boot DBX (revocation list) with the hashes of the vulnerable Shim software and sign the patched version with a valid Microsoft key.

Command to update the DBXCommand to update DBX (Eclypsium)

While the likelihood of widespread exploitation may be low, the potential consequences of CVE-2023-40547 demand immediate attention, as it represents a stealthy avenue for system compromise through pre-OS code execution.

Are u a security researcher? Or a company that writes articles or write ups about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing?

If you want to express your idea in an article contact us here for a quote: [email protected]

Source: bleepingcomputer.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This