CVE-2025-4003
📋 TL;DR
A null pointer dereference vulnerability in RefindPlus 0.14.2.AB's InternalApfsTranslateBlock function allows local attackers to cause denial of service. This affects systems using RefindPlus boot manager with APFS filesystem support. Attackers must have local access to exploit this vulnerability.
💻 Affected Systems
- RefindPlus
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
System crash or boot failure during APFS operations, potentially requiring physical intervention to recover.
Likely Case
Application crash or instability when accessing APFS volumes through RefindPlus.
If Mitigated
Minor performance impact or error logging with proper input validation.
🎯 Exploit Status
Requires local access and ability to trigger specific APFS operations through RefindPlus.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Fixed in commit 4d35125ca689a255647e9033dd60c257d26df7cb
Vendor Advisory: https://github.com/RefindPlusRepo/RefindPlus/issues/206
Restart Required: Yes
Instructions:
1. Update RefindPlus to version containing commit 4d35125ca689a255647e9033dd60c257d26df7cb
2. Rebuild and reinstall RefindPlus
3. Reboot system to apply changes
🔧 Temporary Workarounds
Disable APFS support
allRemove or disable APFS driver loading in RefindPlus configuration
Edit refind.conf and remove/comment APFS driver entries
Remove RP_ApfsDxe.efi from drivers directory
🧯 If You Can't Patch
- Restrict physical access to vulnerable systems
- Implement secure boot and firmware protections to prevent unauthorized boot modifications
🔍 How to Verify
Check if Vulnerable:
Check RefindPlus version and verify if using 0.14.2.AB with APFS support enabled
Check Version:
Check RefindPlus version in boot menu or configuration files
Verify Fix Applied:
Verify commit 4d35125ca689a255647e9033dd60c257d26df7cb is present in installed version
📡 Detection & Monitoring
Log Indicators:
- RefindPlus crash logs
- System boot failures after APFS operations
- Kernel panics during boot
Network Indicators:
- None - local vulnerability only
SIEM Query:
Search for RefindPlus process crashes or boot failure events in system logs
🔗 References
- https://github.com/RefindPlusRepo/RefindPlus/commit/4d35125ca689a255647e9033dd60c257d26df7cb
- https://github.com/RefindPlusRepo/RefindPlus/issues/206
- https://github.com/RefindPlusRepo/RefindPlus/issues/206#event-16595888967
- https://vuldb.com/?ctiid.306339
- https://vuldb.com/?id.306339
- https://vuldb.com/?submit.558123