Description
An out-of-bounds write flaw was found in grub2's NTFS filesystem driver. This issue may allow an attacker to present a specially crafted NTFS filesystem image, leading to grub's heap metadata corruption. In some circumstances, the attack may also corrupt the UEFI firmware heap metadata. As a result, arbitrary code execution and secure boot protection bypass may be achieved.
References (13)
Core 13
Core References
Exploit, Third Party Advisory
https://dfir.ru/2023/10/03/cve-2023-4692-cve-2023-4693-vulnerabilities-in-the-grub-boot-manager/
Mailing List, Third Party Advisory
https://seclists.org/oss-sec/2023/q4/37
Mailing List, Third Party Advisory
https://lists.fedoraproject.org/archives/list/[email protected]/message/FUU42E7CPYLATXOYVYNW6YTXXULAOV6L/
Vendor Advisory
https://security.netapp.com/advisory/ntap-20231208-0002/
Mailing List, Third Party Advisory
https://lists.fedoraproject.org/archives/list/[email protected]/message/OIRJ5UZRXX2KLR4IKBJEQUNGOCXMMDLY/
Mailing List, Third Party Advisory
https://lists.fedoraproject.org/archives/list/[email protected]/message/PERFILCHFEUGG3OAMC6W55P6DDIBZK4Q/
Third Party Advisory
https://security.gentoo.org/glsa/202311-14
Vendor Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2024:2456
Vendor Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2024:3184
Third Party Advisory vdb-entry
x_refsource_redhat
https://access.redhat.com/security/cve/CVE-2023-4692
Issue Tracking, Third Party Advisory issue-tracking
x_refsource_redhat
https://bugzilla.redhat.com/show_bug.cgi?id=2236613
Scores
CVSS v3
7.5
EPSS
0.0000
EPSS Percentile
0.2%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-122
CWE-787
Status
published
Products (3)
gnu/grub2
< 2.12
redhat/enterprise_linux
8.0
redhat/enterprise_linux
9.0
Published
Oct 25, 2023
Tracked Since
Feb 18, 2026