
Cloud Vulnerability DB
A community-led vulnerabilities database
A critical vulnerability (CVE-2024-45781) was discovered in GRUB2, affecting the UFS filesystem handling. The vulnerability was disclosed on February 18, 2025, and involves a failure to validate string length when reading symbolic link names from UFS filesystems. This flaw affects various Linux distributions including Debian and Red Hat systems (NVD, Red Hat CVE).
The vulnerability is classified as a heap out-of-bounds write (CWE-787) with a CVSS v3.1 base score of 6.7 (Medium). The attack vector is local (AV:L) with low attack complexity (AC:L), requiring high privileges (PR:H) but no user interaction (UI:N). The scope is unchanged (S:U) with high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H) (NVD).
The vulnerability can lead to data integrity issues and potentially allow attackers to circumvent secure boot protections. This is particularly concerning as it affects the boot process security and could compromise system integrity (Debian Tracker).
Fixed versions have been released in some distributions, such as Debian sid (version 2.12-7). Ubuntu has noted that their grub2 package does not affect Ubuntu's Secure Boot, though grub2-unsigned contains Secure Boot security fixes (Ubuntu Security, Debian Tracker).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."