CVE-2020-11933 vulnerability in Canonical Products
Published on July 29, 2020
local snapd exploit through cloud-init
cloud-init as managed by snapd on Ubuntu Core 16 and Ubuntu Core 18 devices was run without restrictions on every boot, which a physical attacker could exploit by crafting cloud-init user-data/meta-data via external media to perform arbitrary changes on the device to bypass intended security mechanisms such as full disk encryption. This issue did not affect traditional Ubuntu systems. Fixed in snapd version 2.45.2, revision 8539 and core version 2.45.2, revision 9659.
Vulnerability Analysis
CVE-2020-11933 can be exploited with physical access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality and integrity, and no impact on availability.
Weakness Type
Permissions, Privileges, and Access Controls
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Products Associated with CVE-2020-11933
stack.watch emails you whenever new vulnerabilities are published in Canonical Ubuntu Linux or Canonical Snapd. Just hit a watch button to start following.
Affected Versions
Canonical snapd:- Version 2.45.2 and below 2.45.2, revision 8539 is affected.
- Version 2.45.2 and below 2.45.2, revision 9659 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.