CVE-2025-2486

NameCVE-2025-2486
DescriptionThe Ubuntu edk2 UEFI firmware packages accidentally allowed the UEFI Shell to be accessed in Secure Boot environments, possibly allowing bypass of Secure Boot constraints. Versions 2024.05-2ubuntu0.3 and 2024.02-2ubuntu0.3 disable the Shell. Some previous versions inserted a secure-boot-based decision to continue running inside the Shell itself, which is believed to be sufficient to enforce Secure Boot restrictions. This is an additional repair on top of the incomplete fix for CVE-2023-48733.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
edk2 (PTS)bullseye2020.11-2+deb11u2vulnerable
bullseye (security)2020.11-2+deb11u3vulnerable
bookworm2022.11-6+deb12u2fixed
bookworm (security)2022.11-6+deb12u1fixed
trixie2025.02-8fixed
forky2025.02-9fixed
sid2025.08.01-6fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
edk2sourcebookworm2022.11-6+deb12u1
edk2source(unstable)2023.11-7

Notes

[bullseye] - edk2 <postponed> (Can be piggyback'd with future DLA but be careful about possible regression)
https://bugs.launchpad.net/ubuntu/+source/edk2/+bug/2101797
To address CVE-2023-48733 in Debian a local patch disabled the built-in Shell
when SecureBoot is enabled fixing CVE-2025-2486.
Be cautious of possible regression when backporting patches to stable releases -
https://bugs.launchpad.net/ubuntu/+source/edk2/+bug/2101797/comments/9

Search for package or bug name: Reporting problems