Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:kaspersky:endpoint_security:10:sp2_mr2:*:*:*:*:*:*", "matchCriteriaId": "A8F4B967-14F4-4D86-BBD3-9EC1FB5EA19D", "vulnerable": true}, {"criteria": "cpe:2.3:a:kaspersky:endpoint_security:10:sp2_mr3:*:*:*:*:*:*", "matchCriteriaId": "9B709977-183E-447C-9ABF-09C3FA952923", "vulnerable": true}, {"criteria": "cpe:2.3:a:kaspersky:endpoint_security:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "3E845C95-F057-4E8F-8792-47B4AB79C45A", "vulnerable": true}, {"criteria": "cpe:2.3:a:kaspersky:endpoint_security:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "EA831F0C-84E9-4421-9BED-764C79E4B1BB", "vulnerable": true}, {"criteria": "cpe:2.3:a:kaspersky:endpoint_security:11.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4E8FE1D5-5EB7-453A-8115-6A13B9EF01E6", "vulnerable": true}, {"criteria": "cpe:2.3:a:kaspersky:rescue_disk:*:*:*:*:*:*:*:*", "matchCriteriaId": "833A59BB-3403-4BFC-9161-0D0903C16F12", "versionEndExcluding": "18.0.11.3", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "A component of Kaspersky custom boot loader allowed loading of untrusted UEFI modules due to insufficient check of their authenticity. This component is incorporated in Kaspersky Rescue Disk (KRD) and was trusted by the Authentication Agent of Full Disk Encryption in Kaspersky Endpoint Security (KES). This issue allowed to bypass the UEFI Secure Boot security feature. An attacker would need physical access to the computer to exploit it. Otherwise, local administrator privileges would be required to modify the boot loader component."}, {"lang": "es", "value": "Un componente del cargador de arranque personalizado de Kaspersky permiti\u00f3 la carga de m\u00f3dulos UEFI no confiables debido a una comprobaci\u00f3n insuficiente de su autenticidad. Este componente est\u00e1 incorporado en Kaspersky Rescue Disk (KRD) y fue confiable mediante el Agente de Autenticaci\u00f3n de Full Disk Encryption en Kaspersky Endpoint Security (KES). Este problema permiti\u00f3 omitir la caracter\u00edstica de seguridad UEFI Secure Boot. Un atacante necesitar\u00eda acceso f\u00edsico a la computadora para explotarla. De lo contrario, se necesitar\u00edan privilegios de administrador local para modificar el componente del cargador de arranque"}], "id": "CVE-2020-26200", "lastModified": "2024-11-21T05:19:30.930", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 0.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2021-02-26T14:15:12.037", "references": [{"source": "vulnerability@kaspersky.com", "tags": ["Broken Link"], "url": "https://support.kaspersky.com/general/vulnerability.aspx?el=12430#170221"}, {"source": "nvd@nist.gov", "tags": ["Third Party Advisory"], "url": "https://github.com/CVEProject/cvelist/blob/master/2020/26xxx/CVE-2020-26200.json"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Broken Link"], "url": "https://support.kaspersky.com/general/vulnerability.aspx?el=12430#170221"}], "sourceIdentifier": "vulnerability@kaspersky.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-287"}], "source": "nvd@nist.gov", "type": "Primary"}]}