Vulnerability Description
Fedora CoreOS supports setting a GRUB bootloader password using a Butane config. When this feature is enabled, GRUB requires a password to access the GRUB command-line, modify kernel command-line arguments, or boot non-default OSTree deployments. Recent Fedora CoreOS releases have a misconfiguration which allows booting non-default OSTree deployments without entering a password. This allows someone with access to the GRUB menu to boot into an older version of Fedora CoreOS, reverting any security fixes that have recently been applied to the machine. A password is still required to modify kernel command-line arguments and to access the GRUB command line.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Fedora Coreos | >= 36.20220820.3.0, < 37.20221031.1.0 |
Related Weaknesses (CWE)
References
- https://docs.fedoraproject.org/en-US/fedora-coreos/grub-password/Vendor Advisory
- https://github.com/coreos/fedora-coreos-tracker/issues/1333Issue TrackingThird Party Advisory
- https://lists.fedoraproject.org/archives/list/[email protected].Mailing ListVendor Advisory
- https://docs.fedoraproject.org/en-US/fedora-coreos/grub-password/Vendor Advisory
- https://github.com/coreos/fedora-coreos-tracker/issues/1333Issue TrackingThird Party Advisory
- https://lists.fedoraproject.org/archives/list/[email protected].Mailing ListVendor Advisory
FAQ
What is CVE-2022-3675?
CVE-2022-3675 is a vulnerability with a CVSS score of 2.6 (LOW). Fedora CoreOS supports setting a GRUB bootloader password using a Butane config. When this feature is enabled, GRUB requires a password to access the GRUB command-line, modify kernel command-line argu...
How severe is CVE-2022-3675?
CVE-2022-3675 has been rated LOW with a CVSS base score of 2.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-3675?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Fedora Coreos.