Security KB
N/A
Affected Platforms:
Dell EMC PowerEdge Servers that have UEFI Secure Boot Enabled
As referenced in Dell Security Notice Dell response to Grub2 vulnerabilities which may allow secure boot bypass a group of disclosed vulnerabilities in GRUB (Grand Unified Bootloader), known as "BootHole", can allow for Secure Boot bypass.
The Secure Boot feature is supported on 13G and newer PowerEdge Servers when using an operating system (OS) which also supports this feature. You can view the list of PowerEdge OS Support Matrices here.
Windows:
Windows Operating Systems are impacted as an attacker with physical access to the platform, or OS administrator privileges, could load a vulnerable GRUB UEFI binary.
Customers running Windows on their PowerEdge Servers should refer to Microsoft’s guidance at Microsoft https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200011
Linux:
To verify the Secure Boot status of your system, use the following OS command:
UEFI Boot is disabled; Secure Boot is disabled:
# mokutil --sb-state
EFI variables are not supported on this system
UEFI Boot is enabled; Secure Boot is disabled:
# mokutil --sb-state
SecureBoot disabled
Secure Boot is enabled:
# mokutil --sb-state
SecureBoot enabled
Linux distributions supported by Dell EMC PowerEdge Servers – Red Hat Enterprise Linux, SuSE Enterprise Linux and Ubuntu - have released updated packages containing remediation for the CVEs cited above.
We encourage you to follow the published recommendations of the Linux distribution vendors to update the affected packages, in the proper order, to the latest versions supplied by the Linux distribution vendor.
If Secure Boot fails after applying the Linux distribution vendor’s updates, use one of the following options to recover:
Warning: Once your dbx database has been reset to the factory default, your system is no longer patched, and is vulnerable to these, and any other vulnerabilities, remediated in later updates.
Related Linux distribution vendor advisories