Vulnerability Details : CVE-2018-18653
The Linux kernel, as used in Ubuntu 18.10 and when booted with UEFI Secure Boot enabled, allows privileged local users to bypass intended Secure Boot restrictions and execute untrusted code by loading arbitrary kernel modules. This occurs because a modified kernel/module.c, in conjunction with certain configuration options, leads to mishandling of the result of signature verification.
Products affected by CVE-2018-18653
- cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-18653
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 6 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-18653
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST | |
7.8
|
HIGH | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2018-18653
-
The product does not verify, or incorrectly verifies, the cryptographic signature for data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-18653
-
https://launchpad.net/bugs/1798863
Bug #1798863 “18.10 kernel does not appear to validate kernel mo...” : Bugs : linux package : UbuntuExploit;Issue Tracking;Vendor Advisory
-
https://usn.ubuntu.com/3835-1/
USN-3835-1: Linux kernel vulnerabilities | Ubuntu security noticesPatch;Vendor Advisory
-
https://usn.ubuntu.com/3832-1/
USN-3832-1: Linux kernel (AWS) vulnerabilities | Ubuntu security noticesPatch;Vendor Advisory
Jump to