Cyber Posture

CVE-2025-0624

High

Published: 19 February 2025

Published
19 February 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.6 CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0079 74.0th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-0624 is a high-severity Out-of-bounds Write (CWE-787) vulnerability. Its CVSS base score is 7.6 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Bootkit (T1542.003); ranked in the top 26.0% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Bootkit (T1542.003). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Mandates timely remediation of identified flaws like the grub2 out-of-bounds write via vendor patches such as RHSA-2025:2521.

prevent

Requires validation of the length and content of user-controlled environment variables to prevent buffer overflows during grub2 network boot configuration search.

prevent

Implements memory protection mechanisms such as bounds checking to mitigate out-of-bounds writes in bootloader processes like grub2.

MITRE ATT&CK Enterprise TechniquesAI

T1542.003 Bootkit Stealth
Adversaries may use bootkits to persist on systems.
Why these techniques?

Out-of-bounds write in GRUB2 network boot enables RCE that can install a bootkit and bypass secure boot (T1542.003).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

A flaw was found in grub2. During the network boot process, when trying to search for the configuration file, grub copies data from a user controlled environment variable into an internal buffer using the grub_strcpy() function. During this step, it…

more

fails to consider the environment variable length when allocating the internal buffer, resulting in an out-of-bounds write. If correctly exploited, this issue may result in remote code execution through the same network segment grub is searching for the boot information, which can be used to by-pass secure boot protections.

Deeper analysisAI

CVE-2025-0624 is an out-of-bounds write vulnerability (CWE-787) in grub2, affecting the network boot process. When grub2 searches for a configuration file, it copies data from a user-controlled environment variable into an internal buffer using the grub_strcpy() function without properly considering the variable's length during buffer allocation. This flaw, published on 2025-02-19, has a CVSS v3.1 base score of 7.6 (AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).

An attacker on the same network segment as the target system during the network boot process can exploit this issue remotely. Exploitation requires high privileges (PR:H) and high attack complexity (AC:H), but successful exploitation enables remote code execution with scope change (S:C), potentially allowing attackers to bypass secure boot protections.

Red Hat has addressed this vulnerability through multiple errata, including RHSA-2025:2521, RHSA-2025:2653, RHSA-2025:2655, RHSA-2025:2675, and RHSA-2025:2784, which provide updated grub2 packages as the primary mitigation. Security practitioners should apply these patches to affected systems to prevent exploitation during network booting.

Details

CWE(s)

CVEs Like This One

CVE-2024-45782Shared CWE-787
CVE-2025-1125Shared CWE-787
CVE-2025-20890Shared CWE-787
CVE-2019-25681Shared CWE-787
CVE-2026-23715Shared CWE-787
CVE-2025-21161Shared CWE-787
CVE-2026-21327Shared CWE-787
CVE-2025-21042Shared CWE-787
CVE-2026-3094Shared CWE-787
CVE-2026-27703Shared CWE-787

References