A flaw was found in grub2. Grub's dump command is not blocked when grub is in lockdown mode, which allows the user to read any memory information, and an attacker may leverage this in order to extract signatures, salts, and other sensitive information from the memory.
Metrics
Affected Vendors & Products
References
History
Thu, 18 Sep 2025 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/o:redhat:enterprise_linux:10.0 | |
| References |
|
Thu, 29 May 2025 06:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/o:redhat:enterprise_linux:10 |
Tue, 04 Mar 2025 03:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 19 Feb 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | No description is available for this CVE. | A flaw was found in grub2. Grub's dump command is not blocked when grub is in lockdown mode, which allows the user to read any memory information, and an attacker may leverage this in order to extract signatures, salts, and other sensitive information from the memory. |
| Title | grub2: commands/dump: The dump command is not in lockdown when secure boot is enabled | Grub2: commands/dump: the dump command is not in lockdown when secure boot is enabled |
| First Time appeared |
Redhat
Redhat enterprise Linux Redhat openshift |
|
| CPEs | cpe:/a:redhat:openshift:4 cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
| Vendors & Products |
Redhat
Redhat enterprise Linux Redhat openshift |
|
| References |
|
Wed, 19 Feb 2025 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | No description is available for this CVE. | |
| Title | grub2: commands/dump: The dump command is not in lockdown when secure boot is enabled | |
| Weaknesses | CWE-501 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published: 2025-02-19T17:54:27.651Z
Updated: 2025-09-18T08:45:46.449Z
Reserved: 2025-02-07T16:58:08.564Z
Link: CVE-2025-1118
Updated: 2025-02-21T15:21:27.069Z
Status : Awaiting Analysis
Published: 2025-02-19T18:15:24.280
Modified: 2025-09-18T09:15:35.407
Link: CVE-2025-1118