Learn about CVE-2020-26200 affecting Kaspersky Rescue Disk and Endpoint Security. Find out how to mitigate the UEFI Secure Boot bypass vulnerability and protect your systems.
A component of Kaspersky custom boot loader allowed loading of untrusted UEFI modules due to insufficient check of their authenticity. This issue affected Kaspersky Rescue Disk and Kaspersky Endpoint Security with the Full Disk Encryption component installed.
Understanding CVE-2020-26200
This CVE highlights a vulnerability in Kaspersky products that could allow an attacker to bypass UEFI Secure Boot security.
What is CVE-2020-26200?
The vulnerability stemmed from a component in Kaspersky's custom boot loader that permitted the loading of untrusted UEFI modules without proper authenticity checks. This flaw could be exploited to bypass the UEFI Secure Boot feature.
The Impact of CVE-2020-26200
The vulnerability could be leveraged by an attacker with physical access to the computer or by a local administrator with privileges to modify the boot loader component.
Technical Details of CVE-2020-26200
This section provides more in-depth technical insights into the vulnerability.
Vulnerability Description
The vulnerability allowed the loading of untrusted UEFI modules due to inadequate authenticity checks in Kaspersky's custom boot loader.
Affected Systems and Versions
Exploitation Mechanism
To exploit this vulnerability, an attacker would need physical access to the computer or local administrator privileges to modify the boot loader component.
Mitigation and Prevention
Protecting systems from CVE-2020-26200 requires immediate actions and long-term security practices.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Ensure that Kaspersky Rescue Disk is updated to version 18.0.11.3 (patch C) or later. For Kaspersky Endpoint Security, apply the necessary updates to versions 10 SP2 MR2, 10 SP2 MR3, 11.0.0, 11.0.1, and 11.1.0 to address the vulnerability.