CVE-2020-11933

Published at:
2020-07-29T17:15:12.857

Global infos:

cloud-init as managed by snapd on Ubuntu Core 16 and Ubuntu Core 18 devices was run without restrictions on every boot, which a physical attacker could exploit by crafting cloud-init user-data/meta-data via external media to perform arbitrary changes on the device to bypass intended security mechanisms such as full disk encryption. This issue did not affect traditional Ubuntu systems. Fixed in snapd version 2.45.2, revision 8539 and core version 2.45.2, revision 9659.

CVE Status: Modified

References:

  • [email protected]
  • [email protected]
  • af854a3a-2127-422b-91ae-364da2661108
  • af854a3a-2127-422b-91ae-364da2661108
  • Metrics:

    AttributeValue
    Attack ComplexityLOW
    Attack VectorPHYSICAL
    Availability ImpactNONE
    Base Score7.3
    Base SeverityHIGH
    Confidentiality ImpactHIGH
    Integrity ImpactHIGH
    Privileges RequiredNONE
    ScopeCHANGED
    User InteractionNONE
    Vector StringCVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N
    Exploitability Score0.9
    Impact Score5.8
    Source[email protected]
    TypeSecondary

    Links:

    Exploit-db
    Github