CVE-2020-10759Improper Verification of Cryptographic Signature in Fwupd

Severity
6.0MEDIUMNVD
EPSS
0.0%
top 99.40%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 15
Latest updateMay 24

Description

A PGP signature bypass flaw was found in fwupd (all versions), which could lead to the installation of unsigned firmware. As per upstream, a signature bypass is theoretically possible, but not practical because the Linux Vendor Firmware Service (LVFS) is either not implemented or enabled in versions of fwupd shipped with Red Hat Enterprise Linux 7 and 8. The highest threat from this vulnerability is to confidentiality and integrity.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:NExploitability: 0.8 | Impact: 5.2

Affected Packages3 packages

debiandebian/fwupd< fwupd 1.3.10-1 (bookworm)
Debianfwupd/fwupd< 1.3.10-1+3
debiandebian/libjcat< fwupd 1.3.10-1 (bookworm)

Also affects: Enterprise Linux 7.0, 8.0

🔴Vulnerability Details

2
GHSA
GHSA-phhj-vpf5-5666: A PGP signature bypass flaw was found in fwupd (all versions), which could lead to the installation of unsigned firmware2022-05-24
OSV
CVE-2020-10759: A PGP signature bypass flaw was found in fwupd (all versions), which could lead to the installation of unsigned firmware2020-09-15

📋Vendor Advisories

3
Ubuntu
fwupd vulnerability2020-06-15
Red Hat
fwupd: Possible bypass in signature verification2020-06-05
Debian
CVE-2020-10759: fwupd - A PGP signature bypass flaw was found in fwupd (all versions), which could lead ...2020

💬Community

2
Bugzilla
CVE-2020-10759 fwupd: Possible bypass in signature verification [fedora-all]2020-06-05
Bugzilla
CVE-2020-10759 fwupd: Possible bypass in signature verification2020-06-05
CVE-2020-10759 — Debian Fwupd vulnerability | cvebase