Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-45776: Out-of-bounds Write

0
Medium
VulnerabilityCVE-2024-45776cvecve-2024-45776
Published: Tue Feb 18 2025 (02/18/2025, 19:25:45 UTC)
Source: CVE

Description

When reading the language .mo file in grub_mofile_open(), grub2 fails to verify an integer overflow when allocating its internal buffer. A crafted .mo file may lead the buffer size calculation to overflow, leading to out-of-bound reads and writes. This flaw allows an attacker to leak sensitive data or overwrite critical data, possibly circumventing secure boot protections.

AI-Powered Analysis

AILast updated: 11/11/2025, 08:30:34 UTC

Technical Analysis

CVE-2024-45776 is a vulnerability in the GRUB2 bootloader, specifically in the grub_mofile_open() function responsible for reading language .mo files. The issue stems from a failure to properly verify an integer overflow during the allocation of an internal buffer. When a crafted .mo file is processed, the buffer size calculation can overflow, causing the program to allocate insufficient memory and subsequently perform out-of-bounds reads and writes. This memory corruption can lead to leakage of sensitive information or overwriting of critical data structures within the bootloader environment. Such corruption may allow an attacker to circumvent secure boot protections, potentially enabling unauthorized code execution or persistence at a very early stage of system startup. The vulnerability requires local access with high privileges (PR:H) and does not require user interaction (UI:N). The attack vector is local (AV:L), meaning remote exploitation is not feasible without prior access. The CVSS v3.1 base score is 6.7, reflecting medium severity due to the combination of high impact on confidentiality, integrity, and availability, but limited by the requirement for privileged local access. No known exploits have been reported in the wild as of the publication date. The vulnerability affects all versions of GRUB2 that handle language .mo files in the described manner, which is common in many Linux distributions and embedded systems using GRUB2 as the bootloader.

Potential Impact

For European organizations, this vulnerability poses a significant risk primarily to systems using GRUB2 as their bootloader, which includes a vast majority of Linux-based servers and workstations. The ability to leak sensitive data or overwrite critical bootloader data can compromise system integrity and confidentiality, potentially allowing attackers to bypass secure boot mechanisms designed to prevent unauthorized code execution during system startup. This could lead to persistent malware infections, unauthorized access to sensitive environments, and disruption of critical services. Sectors such as finance, healthcare, government, and critical infrastructure in Europe, which rely heavily on Linux servers, are particularly vulnerable. The requirement for local privileged access limits the attack surface but does not eliminate risk, especially in environments where insider threats or lateral movement by attackers are concerns. The absence of known exploits currently provides a window for proactive mitigation, but the potential for future exploitation necessitates urgent attention.

Mitigation Recommendations

1. Apply patches from Linux distribution vendors or GRUB2 maintainers as soon as they become available to address the integer overflow and buffer allocation issue. 2. Restrict local access to systems running GRUB2 to trusted administrators only, minimizing the risk of exploitation by unauthorized users. 3. Implement strict access controls and monitoring on systems with GRUB2 to detect any unauthorized attempts to modify or replace language .mo files or bootloader components. 4. Employ secure boot and measured boot technologies alongside GRUB2 to enhance boot integrity verification and detect tampering. 5. Regularly audit and harden bootloader configurations and file permissions to prevent unauthorized file manipulations. 6. Use endpoint detection and response (EDR) solutions capable of monitoring low-level system changes that could indicate exploitation attempts. 7. Educate system administrators about the risks of local privilege escalation and the importance of maintaining secure boot environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-09-08T01:57:12.947Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fc1484d88663aecc60

Added to database: 5/20/2025, 6:59:08 PM

Last enriched: 11/11/2025, 8:30:34 AM

Last updated: 11/20/2025, 2:37:39 AM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats