{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-28T01:41:49.393","vulnerabilities":[{"cve":{"id":"CVE-2023-48733","sourceIdentifier":"security@ubuntu.com","published":"2024-02-14T22:15:47.320","lastModified":"2025-08-26T17:19:40.457","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"An insecure default to allow UEFI Shell in EDK2 was left enabled in Ubuntu's EDK2. This allows an OS-resident attacker to bypass Secure Boot."},{"lang":"es","value":"Un valor predeterminado inseguro para permitir UEFI Shell en EDK2 se dejó habilitado en EDK2 de Ubuntu. Esto permite que un atacante residente en el sistema operativo omita el arranque seguro."}],"metrics":{"cvssMetricV31":[{"source":"security@ubuntu.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":6.7,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.8,"impactScore":5.9}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-1188"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:canonical:lxd:5.0:candidate:*:*:*:*:*:*","matchCriteriaId":"3B09DDCF-2D2C-4670-BEDF-5C3574AE0595"},{"vulnerable":true,"criteria":"cpe:2.3:a:canonical:lxd:5.21:candidate:*:*:*:*:*:*","matchCriteriaId":"0707C567-7592-4564-86C3-427B4883E491"},{"vulnerable":true,"criteria":"cpe:2.3:a:canonical:lxd:5.21:edge:*:*:*:*:*:*","matchCriteriaId":"9E7C13D8-BD34-44CA-B66A-328FD0A99919"},{"vulnerable":true,"criteria":"cpe:2.3:a:tianocore:edk2:*:-:*:*:*:*:*:*","versionEndIncluding":"2023.11-8","matchCriteriaId":"6CE995B2-F287-4E18-B840-6EC5171BBBA5"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","matchCriteriaId":"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"}]}]}],"references":[{"url":"https://bugs.launchpad.net/ubuntu/+source/edk2/+bug/2040137","source":"security@ubuntu.com","tags":["Issue Tracking"]},{"url":"https://bugs.launchpad.net/ubuntu/+source/lxd/+bug/2040139","source":"security@ubuntu.com","tags":["Issue Tracking"]},{"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00028.html","source":"security@ubuntu.com","tags":["Mailing List"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-48733","source":"security@ubuntu.com","tags":["Third Party Advisory"]},{"url":"https://www.openwall.com/lists/oss-security/2024/02/14/4","source":"security@ubuntu.com","tags":["Mailing List"]},{"url":"https://bugs.launchpad.net/ubuntu/+source/edk2/+bug/2040137","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking"]},{"url":"https://bugs.launchpad.net/ubuntu/+source/lxd/+bug/2040139","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking"]},{"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00028.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-48733","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://www.openwall.com/lists/oss-security/2024/02/14/4","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List"]}]}}]}