CVE-2025-1118
Rocky Linux vulnerability analysis and mitigation

Overview

CVE-2025-1118 is a security vulnerability discovered in GRUB2 (Grand Unified Bootloader version 2) that was disclosed on February 18, 2025. The vulnerability stems from GRUB's dump command not being properly blocked when the system is in lockdown mode with secure boot enabled. This flaw affects the GRUB2 bootloader system and its security mechanisms (NVD, OSS Security).

Technical details

The vulnerability is characterized by a trust boundary violation (CWE-501) where the dump command remains accessible despite system lockdown mode being active. The issue has been assigned a CVSS v3.1 base score of 4.4 (Medium) with the following vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N. This indicates that the vulnerability requires local access and high privileges to exploit, but can result in high confidentiality impact (Red Hat Security, OSS Security).

Impact

The vulnerability allows an attacker with local access to read any memory information through the dump command, potentially exposing sensitive data such as signatures, salts, and other critical security information stored in memory. This exposure could compromise the secure boot mechanism's integrity (Red Hat Bugzilla).

Mitigation and workarounds

Fixes for this vulnerability have been made public and are being distributed through various Linux distributions. Debian has addressed this in version 2.12-7 of the grub2 package. Users are advised to update their GRUB2 installations to the latest version that includes the security fix (Debian Security).

Additional resources


SourceThis report was generated using AI

Related Rocky Linux vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-55315CRITICAL9.9
  • C#C#
  • dotnet-templates-8.0
NoYesOct 14, 2025
CVE-2025-11715HIGH8.8
  • NixOSNixOS
  • firefox
NoYesOct 14, 2025
CVE-2025-11714HIGH8.8
  • NixOSNixOS
  • MozillaFirefox-translations-common
NoYesOct 14, 2025
CVE-2025-55247HIGH7.3
  • C#C#
  • dotnet-host
NoYesOct 14, 2025
CVE-2025-55248MEDIUM5.7
  • C#C#
  • aspnetcore-runtime-dbg-8.0
NoYesOct 14, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management