{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-10T02:32:13.823","vulnerabilities":[{"cve":{"id":"CVE-2023-49721","sourceIdentifier":"security@ubuntu.com","published":"2024-02-14T22:15:47.530","lastModified":"2025-08-26T17:19:29.193","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"An insecure default to allow UEFI Shell in EDK2 was left enabled in LXD. This allows an OS-resident attacker to bypass Secure Boot."},{"lang":"es","value":"Un valor predeterminado inseguro para permitir UEFI Shell en EDK2 se dejó habilitado en LXD. Esto permite que un atacante residente en el sistema operativo omita el arranque seguro."}],"metrics":{"cvssMetricV31":[{"source":"security@ubuntu.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":6.7,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.8,"impactScore":5.9}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-276"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:canonical:lxd:*:*:*:*:*:*:*:*","versionStartIncluding":"5.0.0","versionEndExcluding":"5.21.0","matchCriteriaId":"CCDFE8E4-47BD-40FE-93BB-FC5106157DDF"},{"vulnerable":true,"criteria":"cpe:2.3:a:tianocore:edk2:*:-:*:*:*:*:*:*","versionEndIncluding":"2023.11-8","matchCriteriaId":"6CE995B2-F287-4E18-B840-6EC5171BBBA5"}]}]}],"references":[{"url":"https://bugs.launchpad.net/ubuntu/+source/edk2/+bug/2040137","source":"security@ubuntu.com","tags":["Issue Tracking"]},{"url":"https://bugs.launchpad.net/ubuntu/+source/lxd/+bug/2040139","source":"security@ubuntu.com","tags":["Issue Tracking"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-48733","source":"security@ubuntu.com","tags":["Third Party Advisory"]},{"url":"https://www.openwall.com/lists/oss-security/2024/02/14/4","source":"security@ubuntu.com","tags":["Mailing List"]},{"url":"https://bugs.launchpad.net/ubuntu/+source/edk2/+bug/2040137","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking"]},{"url":"https://bugs.launchpad.net/ubuntu/+source/lxd/+bug/2040139","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-48733","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://www.openwall.com/lists/oss-security/2024/02/14/4","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List"]}]}}]}