Cyber Security News

Microsoft Uncovers Several Vulnerabilities in GRUB2, U-Boot, Barebox Bootloaders Using Copilot

Microsoft has discovered multiple critical vulnerabilities affecting widely used bootloaders including GRUB2, U-Boot, and Barebox.

These security flaws potentially expose systems to sophisticated boot-level attacks that could compromise devices before operating systems even initialize, allowing attackers to gain persistent and nearly undetectable control over affected systems.

The vulnerabilities impact thousands of Linux systems and embedded devices that rely on these open-source bootloaders to initialize hardware and load operating systems.

GRUB2 (Grand Unified Bootloader version 2) is particularly concerning given its widespread adoption across enterprise Linux distributions and some secure boot implementations.

U-Boot and Barebox vulnerabilities affect numerous embedded systems, IoT devices, and network appliances, creating a vast attack surface across industries.

Microsoft researchers noted these flaws during a proactive security review using their AI-powered Copilot tool to analyze bootloader codebases.

The company’s security team discovered that specific memory handling functions within these bootloaders fail to properly validate input sizes, potentially allowing attackers to execute arbitrary code during the boot process.

These vulnerabilities exist in the secure boot verification chain, potentially undermining the foundational security these systems are built upon.

Vulnerabilities

The most severe vulnerability, tracked as CVE-2025-21XX, affects GRUB2’s memory allocation functions when parsing configuration files.

Here below we have mentioned all the vulnerabilities:-

BootloaderVulnerability
GRUB2CVE-2024-56737
GRUB2CVE-2024-56738
GRUB2CVE-2025-0677
GRUB2CVE-2025-0678
GRUB2CVE-2025-0684
GRUB2CVE-2025-0685
GRUB2CVE-2025-0686
GRUB2CVE-2025-0689
GRUB2CVE-2025-0690
GRUB2CVE-2025-1118
GRUB2CVE-2025-1125
U-bootCVE-2025-26726
U-bootCVE-2025-26727
U-bootCVE-2025-26728
U-bootCVE-2025-26729
BareboxCVE-2025-26721
BareboxCVE-2025-26722
BareboxCVE-2025-26723
BareboxCVE-2025-26724
BareboxCVE-2025-26725

An attacker with physical access or administrative privileges could exploit this flaw to bypass secure boot mechanisms and execute malicious code that persists across system reboots and reinstallations.

One particularly concerning vulnerability involves improper boundary checking in GRUB2’s parsing function, as demonstrated in this vulnerable code segment:-

grub_err_t grub_parser_execute(char *script)
{
  grub_parser_t parser = grub_parser_get_current();
  return parser->parse_line(script, read_hook); // No proper input validation
}

The technical analysis reveals that attackers could craft specially formatted configuration entries that trigger buffer overflow conditions, allowing arbitrary code execution during boot.

This exploitation technique bypasses traditional security controls by gaining execution before the operating system security features activate.

Microsoft’s discovery underscores the critical importance of securing the boot process as a fundamental layer of defense.

System administrators are advised to apply emergency patches that bootloader maintainers have released in response to Microsoft’s responsible disclosure.

For systems that cannot be immediately updated, Microsoft recommends implementing physical security measures and restricting administrative access to mitigate the risk of exploitation.

GRUB2 Bootloader Vulnerability Exploitation Chain (Source – Microsoft)

This discovery highlights the growing role of AI-assisted cybersecurity research in identifying complex vulnerabilities in critical infrastructure components that might otherwise remain undiscovered until exploited in the wild.

Are You from SOC/DFIR Team? - Try Free Malware Research with ANY.RUN - Start Now

Tushar Subhra Dutta

Tushar is a senior cybersecurity and breach reporter. He specializes in covering cybersecurity news, trends, and emerging threats, data breaches, and malware attacks. With years of experience, he brings clarity and depth to complex security topics.

Recent Posts

Threat Actors Actively Using Open-Source C2 Framework to Deliver Malicious Payloads

A new wave of cyber threats is emerging as criminals increasingly weaponize AdaptixC2, a free…

27 minutes ago

Hackers Weaponizing Windows LNK File UI Misrepresentation Remote Code Execution Vulnerability

Chinese-affiliated threat actor UNC6384 has been actively leveraging a critical Windows shortcut vulnerability to target…

2 hours ago

Kimsuky and Lazarus Hacker Groups Unveil New Tools That Enable Backdoor and Remote Access

Threat actors operating under the control of North Korea's regime have demonstrated continued technical sophistication…

2 hours ago

Threat Actors Using Multilingual ZIP File to Attack Financial and Government Organizations

Sophisticated threat actors have orchestrated a coordinated multilingual phishing campaign targeting financial and government organizations…

3 hours ago

AzureHound Penetration Testing Tool Weaponized by Threat Actors to Enumerate Azure and Entra ID

AzureHound, an open-source data collection tool designed for legitimate penetration testing and security research, has…

3 hours ago

CISA Warns of XWiki Platform Injection vulnerability Exploited to Execute Remote Code

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning about a…

3 hours ago