A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. This flaw is only exploitable during the early boot phase, an attacker needs to perform a Man-in-the-Middle or compromise the boot server to be able to exploit this vulnerability successfully.
                
            Metrics
Affected Vendors & Products
References
        History
                    Tue, 17 Jun 2025 22:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Fri, 22 Nov 2024 12:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References |  | 
Mon, 16 Sep 2024 19:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References |  | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: redhat
Published: 2024-01-25T15:54:23.102Z
Updated: 2025-10-01T08:50:56.538Z
Reserved: 2023-08-15T20:04:15.615Z
Link: CVE-2023-40547
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-08-02T18:38:50.942Z
 NVD
                        NVD
                    Status : Modified
Published: 2024-01-25T16:15:07.717
Modified: 2024-11-21T08:19:41.650
Link: CVE-2023-40547
 Redhat
                        Redhat