Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-45776: Out-of-bounds Write

0
Medium
VulnerabilityCVE-2024-45776cvecve-2024-45776
Published: Tue Feb 18 2025 (02/18/2025, 19:25:45 UTC)
Source: CVE

Description

When reading the language .mo file in grub_mofile_open(), grub2 fails to verify an integer overflow when allocating its internal buffer. A crafted .mo file may lead the buffer size calculation to overflow, leading to out-of-bound reads and writes. This flaw allows an attacker to leak sensitive data or overwrite critical data, possibly circumventing secure boot protections.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 07:04:23 UTC

Technical Analysis

CVE-2024-45776 is a vulnerability identified in the GRUB2 bootloader component grub_mofile_open(), which processes language .mo files used for localization. The vulnerability stems from a failure to properly verify integer overflow conditions when allocating an internal buffer size. Specifically, when reading a crafted .mo file, the calculation for the buffer size can overflow, causing the allocation to be smaller than intended. This leads to out-of-bounds memory reads and writes during subsequent processing. Such memory corruption can be leveraged by an attacker to leak sensitive information from memory or overwrite critical data structures. This may include manipulation of secure boot parameters or other bootloader integrity checks, potentially allowing an attacker to bypass secure boot protections. The attack requires local access with high privileges (PR:H) but does not require user interaction (UI:N). The vulnerability affects all versions of GRUB2 that handle .mo files in this manner, though specific affected versions are not detailed. The CVSS v3.1 base score is 6.7, indicating a medium severity with high impact on confidentiality, integrity, and availability. No public exploits are known at this time, but the flaw represents a significant risk in environments where GRUB2 is used and secure boot is critical. The vulnerability was reserved in September 2024 and published in February 2025, with enrichment from CISA indicating its recognized importance.

Potential Impact

The primary impact of CVE-2024-45776 is the potential for attackers with local high-level privileges to execute out-of-bounds memory operations within the GRUB2 bootloader. This can lead to leakage of sensitive information, such as cryptographic keys or boot configuration data, compromising confidentiality. Additionally, overwriting critical data structures may allow attackers to alter boot parameters or bypass secure boot protections, undermining system integrity and availability. This could facilitate persistent malware infections or rootkits that load before the OS, evading detection by traditional security controls. Systems relying on GRUB2 for boot management, especially those enforcing secure boot policies, are at risk of having their boot integrity compromised. The requirement for local privileged access limits remote exploitation but does not eliminate risk in multi-user or shared environments. The absence of known exploits reduces immediate threat but patching is essential to prevent future exploitation. Organizations with critical infrastructure, sensitive data, or compliance requirements involving secure boot should consider this vulnerability a significant risk.

Mitigation Recommendations

To mitigate CVE-2024-45776, organizations should: 1) Monitor vendor advisories and apply GRUB2 patches promptly once released to address the integer overflow and buffer allocation flaw. 2) Restrict local access to systems and ensure only trusted administrators have high privilege levels capable of modifying or injecting .mo files. 3) Harden boot environments by enforcing strict file integrity monitoring on GRUB2 configuration and localization files to detect unauthorized modifications. 4) Implement secure boot policies with hardware root of trust to limit the impact of bootloader compromise. 5) Use system-level protections such as SELinux or AppArmor to constrain GRUB2 processes and limit their ability to perform unauthorized memory operations. 6) Conduct regular audits of bootloader configurations and logs to detect anomalies. 7) Educate system administrators about the risks of loading untrusted localization files or modifying bootloader components. These steps go beyond generic advice by focusing on controlling local privilege access, integrity monitoring of boot components, and layered security controls around the boot process.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-09-08T01:57:12.947Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fc1484d88663aecc60

Added to database: 5/20/2025, 6:59:08 PM

Last enriched: 2/28/2026, 7:04:23 AM

Last updated: 3/26/2026, 8:13:43 AM

Views: 59

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses