CVE-2023-4001
Alma Linux vulnerability analysis and mitigation

Overview

CVE-2023-4001 is an authentication bypass vulnerability discovered in GRUB (GRand Unified Bootloader) that affects the password protection feature. The vulnerability was discovered on April 3, 2023, and publicly disclosed on January 15, 2024. The flaw affects Red Hat's downstream version of GRUB2 and does not impact the upstream package. The vulnerability allows an attacker with physical access to bypass GRUB's password protection on UEFI-based systems (DFIR Blog).

Technical details

The vulnerability exists in how GRUB uses the UUID of a device to search for the configuration file containing the password hash. On UEFI systems, the GRUB configuration is split between two files: one in the EFI System Partition and the main configuration file in the /boot volume. The vulnerability can be exploited when an attacker attaches an external drive (like a USB stick) containing a file system with a duplicate UUID matching the /boot file system. Due to how some UEFI systems enumerate removable drives before non-removable ones, GRUB may pick the wrong device, resulting in authentication bypass. The vulnerability has been assigned a CVSS v3.1 base score of 6.8 (Medium) with vector: AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H (NVD, Red Hat).

Impact

When successfully exploited, this vulnerability allows an attacker with physical access to bypass the GRUB password protection feature, potentially enabling them to modify boot parameters, boot unauthorized operating systems, or gain elevated privileges in the installed operating system. In some uncommon setups, the attack can be performed with physical access alone, without requiring unprivileged user access (DFIR Blog).

Mitigation and workarounds

Red Hat has implemented a fix that adds a new argument to the 'search' command, which restricts the UUID scan to the block device used to launch the GRUB boot manager. This ensures that the /boot volume must reside on the same drive as the EFI System Partition. Users should remove the stub grub.cfg in their ESP by executing 'rm /boot/efi/EFI/redhat/grub.cfg' before applying the update, so it is regenerated with the correct search flags (Red Hat Bugzilla, DFIR Blog).

Additional resources


SourceThis report was generated using AI

Related Alma Linux vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-43541MEDIUM4.3
  • Apple SafariApple Safari
  • webkit2gtk4-devel
NoYesDec 17, 2025
CVE-2025-43536MEDIUM4.3
  • Apple SafariApple Safari
  • webkit2gtk3-devel
NoYesDec 17, 2025
CVE-2025-43535MEDIUM4.3
  • Apple SafariApple Safari
  • webkitgtk
NoYesDec 17, 2025
CVE-2025-43531LOW3.1
  • Apple SafariApple Safari
  • webkit2gtk3-minibrowser
NoYesDec 17, 2025
CVE-2025-61594LOW2.7
  • RubyRuby
  • rubygem-rake
NoYesDec 30, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management