Das U-Boot through 2020.01 allows attackers to bypass verified boot restrictions and subsequently boot arbitrary images by providing a crafted FIT image to a system configured to boot the default configuration.
https://github.com/u-boot/u-boot/commits/master
http://www.openwall.com/lists/oss-security/2020/03/18/5
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00030.html
https://labs.f-secure.com/advisories/das-u-boot-verified-boot-bypass/
Source: Mitre, NVD
Published: 2020-03-19
Updated: 2024-11-21
Base Score: 6.8
Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P
Severity: Medium
Base Score: 7.8
Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Severity: High
EPSS: 0.00178