Share on facebook
Share on twitter
Share on linkedin
Share on email
Share on whatsapp

CVE-2020-10713 AKA BootHole – GRUB2 vulnerability that exploits secure boot

What is it exactly?

GRUB2 is a bootloader for widely used on x86 platforms. One of the most important features of Grub2 from security perspective is the support in secure boot. Secure boot ensures the software loaded by the system is trusted. The BootHole exploit is utilizing vulnerability in Grub2 to break the chain of trust and install a malicious code on the compromised system.

It’s important to note that the exploit requires write access to grub.cfg file, which usually requires root permissions.

Is my product vulnerable?

All current Grub2 releases up to 2.04 are vulnerable. Patches are being applied by most Linux distribution vendors, as well as Grub2 upstream repository.

What is the mitigation?

Apply code patch: http://git.savannah.gnu.org/gitweb/?p=grub.git;a=commitdiff;h=a4d3fbdff1e3ca8f87642af2ac8752c30c617a3e

Install the most recent grub2 package update if using a Linux distribution.

Hardenite audit will identify the vulnerability and provide actionable mitigation recommendations.

Get comprehensive security for Linux

More articles

Download a free demo version of

Hardenite Audit
Please fill the form below. We will review your request and send a download link to your email shortly.

Meet us at

Cybertech 2020

28-30.1.2020 | Tel Aviv

Hardenite - Linux OS security by design
Skip to content