CVE-2025-4002
📋 TL;DR
This vulnerability in RefindPlus 0.14.2.AB allows local attackers to trigger a null pointer dereference in the GetDebugLogFile function, potentially causing the bootloader to crash. Only systems using the vulnerable version of RefindPlus bootloader are affected. The attack requires local access to the system.
💻 Affected Systems
- RefindPlus
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
System fails to boot properly, requiring physical intervention or recovery media to restore functionality.
Likely Case
Boot process interruption or system instability during boot, potentially requiring reboot or manual recovery.
If Mitigated
Minimal impact with proper access controls preventing unauthorized local access.
🎯 Exploit Status
Requires local access and knowledge of triggering the null pointer dereference; no public exploit code identified.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Fixed in commit d2143a1e2deefddd9b105fb7160763c4f8d47ea2
Vendor Advisory: https://github.com/RefindPlusRepo/RefindPlus/issues/204
Restart Required: Yes
Instructions:
1. Update RefindPlus to version containing commit d2143a1e2deefddd9b105fb7160763c4f8d47ea2
2. Rebuild bootloader if needed
3. Reboot system to apply changes
🔧 Temporary Workarounds
Restrict physical access
allPrevent unauthorized local access to systems using RefindPlus
Disable debug logging
allIf possible, disable debug logging features in RefindPlus configuration
🧯 If You Can't Patch
- Implement strict physical security controls to prevent unauthorized local access
- Consider alternative bootloaders if RefindPlus is not essential
🔍 How to Verify
Check if Vulnerable:
Check RefindPlus version: grep -i 'version' /boot/efi/EFI/refind/refind.conf or similar location
Check Version:
Check refind.conf or bootloader files for version information
Verify Fix Applied:
Verify RefindPlus has been updated to version containing commit d2143a1e2deefddd9b105fb7160763c4f8d47ea2
📡 Detection & Monitoring
Log Indicators:
- Boot failures
- RefindPlus crash logs
- System boot interruption events
Network Indicators:
- None - local attack only
SIEM Query:
Search for boot failure events or RefindPlus-related crash logs in system logs
🔗 References
- https://github.com/RefindPlusRepo/RefindPlus/commit/d2143a1e2deefddd9b105fb7160763c4f8d47ea2
- https://github.com/RefindPlusRepo/RefindPlus/issues/204
- https://github.com/RefindPlusRepo/RefindPlus/issues/204#issuecomment-2696817643
- https://vuldb.com/?ctiid.306338
- https://vuldb.com/?id.306338
- https://vuldb.com/?submit.558122