The Ubuntu edk2 UEFI firmware packages accidentally allowed the UEFI Shell to be accessed in Secure Boot environments, possibly allowing bypass of Secure Boot constraints. Versions 2024.05-2ubuntu0.3 and 2024.02-2ubuntu0.3 disable the Shell. Some previous versions inserted a secure-boot-based decision to continue running inside the Shell itself, which is believed to be sufficient to enforce Secure Boot restrictions. This is an additional repair on top of the incomplete fix for CVE-2023-48733.
History

Wed, 26 Nov 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 26 Nov 2025 17:45:00 +0000

Type Values Removed Values Added
Description The Ubuntu edk2 UEFI firmware packages accidentally allowed the UEFI Shell to be accessed in Secure Boot environments, possibly allowing bypass of Secure Boot constraints. Versions 2024.05-2ubuntu0.3 and 2024.02-2ubuntu0.3 disable the Shell. Some previous versions inserted a secure-boot-based decision to continue running inside the Shell itself, which is believed to be sufficient to enforce Secure Boot restrictions. This is an additional repair on top of the incomplete fix for CVE-2023-48733.
Title UEFI Shell accessible in AAVMF with Secure Boot enabled on Ubuntu
Weaknesses CWE-489
References
Metrics cvssV4_0

{'score': 3.7, 'vector': 'CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H/E:U'}


cve-icon MITRE

Status: PUBLISHED

Assigner: canonical

Published: 2025-11-26T17:33:17.506Z

Updated: 2025-11-26T18:25:29.426Z

Reserved: 2025-03-18T01:16:20.240Z

Link: CVE-2025-2486

cve-icon Vulnrichment

Updated: 2025-11-26T18:25:21.850Z

cve-icon NVD

Status : Received

Published: 2025-11-26T18:15:48.357

Modified: 2025-11-26T18:15:48.357

Link: CVE-2025-2486

cve-icon Redhat

No data.