Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61661: Incorrect Calculation of Buffer Size in GNU grub2

0
Medium
VulnerabilityCVE-2025-61661cvecve-2025-61661
Published: Tue Nov 18 2025 (11/18/2025, 18:20:42 UTC)
Source: CVE Database V5
Vendor/Project: GNU
Product: grub2

Description

A vulnerability has been identified in the GRUB (Grand Unified Bootloader) component. This flaw occurs because the bootloader mishandles string conversion when reading information from a USB device, allowing an attacker to exploit inconsistent length values. A local attacker can connect a maliciously configured USB device during the boot sequence to trigger this issue. A successful exploitation may lead GRUB to crash, leading to a Denial of Service. Data corruption may be also possible, although given the complexity of the exploit the impact is most likely limited.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 15:48:13 UTC

Technical Analysis

CVE-2025-61661 is a vulnerability identified in the GNU GRUB2 bootloader, specifically related to how it calculates buffer sizes during string conversion when reading information from USB devices during the boot process. The flaw arises because GRUB2 mishandles length values, leading to inconsistent or incorrect buffer size calculations. This vulnerability can be exploited by a local attacker who has physical access to the machine and can connect a specially crafted malicious USB device during the boot sequence. When exploited, this causes GRUB2 to crash, resulting in a denial of service (DoS) condition that prevents the system from booting properly. Additionally, there is a possibility of data corruption, although the complexity of triggering this makes it less likely. The vulnerability does not require any privileges or user interaction beyond physical access. The CVSS 3.1 score is 4.8 (medium), reflecting the attack vector as physical (local), high attack complexity, no privileges required, no user interaction, unchanged scope, no confidentiality impact, low integrity impact, and high availability impact. GRUB2 is widely used as the default bootloader in many Linux distributions, making this vulnerability relevant to a broad range of systems. Currently, no known exploits are reported in the wild, and no official patches have been linked, though vendors are expected to address this issue. The vulnerability highlights the risks associated with physical access and boot-time device handling in critical system components.

Potential Impact

The primary impact of CVE-2025-61661 is denial of service, where affected systems fail to boot due to GRUB2 crashing when processing malicious USB device data during startup. This can cause operational downtime, especially in environments where physical access is not tightly controlled or where unattended systems are rebooted frequently. The potential for data corruption, while less likely, could lead to system instability or loss of critical boot configuration data, complicating recovery efforts. Since GRUB2 is a fundamental component in the boot process of many Linux-based systems, this vulnerability affects a wide range of servers, desktops, and embedded devices. Organizations relying on Linux infrastructure may face service interruptions and increased support costs. The requirement for physical access limits remote exploitation, but insider threats or attackers with temporary physical access could leverage this vulnerability. No confidentiality impact is expected, so data breaches are unlikely. The medium severity reflects the balance between the limited attack vector and the significant availability impact.

Mitigation Recommendations

To mitigate CVE-2025-61661, organizations should implement strict physical security controls to prevent unauthorized access to systems, especially during boot sequences. Disable or restrict booting from external USB devices in BIOS/UEFI settings where possible, or enable secure boot features to prevent unauthorized bootloaders or devices from being used. Monitor and audit physical access logs and consider using tamper-evident seals on critical hardware. Until patches are available, avoid rebooting critical systems unnecessarily and ensure that only trusted personnel have physical access. Vendors and system administrators should prioritize applying patches or updates once released by GNU or Linux distribution maintainers. Additionally, consider using hardware-based boot security features such as TPM (Trusted Platform Module) and secure boot chains to reduce the risk of bootloader manipulation. Document and test recovery procedures to quickly restore systems affected by a DoS condition caused by this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2025-09-29T20:18:48.974Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691cbabbfcab56a016d7f801

Added to database: 11/18/2025, 6:28:11 PM

Last enriched: 2/27/2026, 3:48:13 PM

Last updated: 3/26/2026, 6:54:59 AM

Views: 112

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses