CVE-2025-61664Expired Pointer Dereference in Grub2

Severity
4.9MEDIUMNVD
EPSS
0.0%
top 96.67%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 18

Description

A vulnerability in the GRUB2 bootloader has been identified in the normal module. This flaw, a memory Use After Free issue, occurs because the normal_exit command is not properly unregistered when its related module is unloaded. An attacker can exploit this condition by invoking the command after the module has been removed, causing the system to improperly access a previously freed memory location. This leads to a system crash or possible impacts in data confidentiality and integrity.

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:LExploitability: 1.4 | Impact: 3.4

Affected Packages1 packages

CVEListV5gnu/grub22.14

🔴Vulnerability Details

3
GHSA
GHSA-7w9h-j8xp-j97v: A vulnerability in the GRUB2 bootloader has been identified in the normal module2025-11-18
CVEList
Grub2: missing unregister call for normal_exit command may lead to use-after-free2025-11-18
OSV
CVE-2025-61664: A vulnerability in the GRUB2 bootloader has been identified in the normal module2025-11-18

📋Vendor Advisories

3
Red Hat
grub2: Missing unregister call for normal_exit command may lead to use-after-free2025-11-18
Microsoft
Grub2: missing unregister call for normal_exit command may lead to use-after-free2025-11-11
Debian
CVE-2025-61664: grub2 - A vulnerability in the GRUB2 bootloader has been identified in the normal module...2025