Description
An out-of-bounds read flaw was found on grub2's NTFS filesystem driver. This issue may allow a physically present attacker to present a specially crafted NTFS file system image to read arbitrary memory locations. A successful attack allows sensitive data cached in memory or EFI variable values to be leaked, presenting a high Confidentiality risk.
References (13)
Core 13
Core References
Exploit, Third Party Advisory
https://dfir.ru/2023/10/03/cve-2023-4692-cve-2023-4693-vulnerabilities-in-the-grub-boot-manager/
Mailing List, Third Party Advisory
https://seclists.org/oss-sec/2023/q4/37
Vendor Advisory
https://security.netapp.com/advisory/ntap-20231208-0002/
Mailing List, Third Party Advisory
https://lists.fedoraproject.org/archives/list/[email protected]/message/FUU42E7CPYLATXOYVYNW6YTXXULAOV6L/
Mailing List, Third Party Advisory
https://lists.fedoraproject.org/archives/list/[email protected]/message/OIRJ5UZRXX2KLR4IKBJEQUNGOCXMMDLY/
Mailing List, Third Party Advisory
https://lists.fedoraproject.org/archives/list/[email protected]/message/PERFILCHFEUGG3OAMC6W55P6DDIBZK4Q/
Third Party Advisory
https://security.gentoo.org/glsa/202311-14
Vendor Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2024:2456
Vendor Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2024:3184
Third Party Advisory vdb-entry
x_refsource_redhat
https://access.redhat.com/security/cve/CVE-2023-4693
Issue Tracking, Third Party Advisory issue-tracking
x_refsource_redhat
https://bugzilla.redhat.com/show_bug.cgi?id=2238343
Scores
CVSS v3
5.3
EPSS
0.0001
EPSS Percentile
1.2%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
Details
CWE
CWE-125
Status
published
Products (3)
gnu/grub2
< 2.12
redhat/enterprise_linux
8.0
redhat/enterprise_linux
9.0
Published
Oct 25, 2023
Tracked Since
Feb 18, 2026