Grub2 Bootloader Security Bug Provides Password Bypass on GNU/Linux OS

Another major security vulnerability has hit the open source ecosystem following the announcement that an "incalculable number" of Linux-based systems can be hacked via a bootloader bug.

Christopher Tozzi, Contributing Editor

December 23, 2015

2 Min Read
Grub2 Bootloader Security Bug Provides Password Bypass on GNU/Linux OS

Another major security vulnerability has hit the open source ecosystem following the announcement that an “incalculable number” of Linux-based systems can be hacked via a bootloader bug.

The bug, which security researchers disclosed on Dec. 10, affects systems that use Grub2, the current version of the GRUB bootloader. GRUB is the part of the system that runs soon after users turn on the computer. Its job is to load the Linux kernel or whichever other operating system (or a bootloader for it, as the case may be) users select.

On affected devices, pressing the backspace key twenty-eight times allows an attacker to bypass authentication mechanisms that have been set up to secure the system. This allows the attacker to gain access to a rescue shell without having to enter a password. From there, it’s possible to remove the authentication system entirely and then boot to the operating systems installed to disk, from which the attacker would have full access to all data on the system.

The bad news is that Grub2, as the default bootloader that ships with most mainstream GNU/Linux distributions, is widely used on devices that run open source platforms. That means lots and lots of devices — indeed, an “incalculable number,” according to the researchers who reported the bug — could be subject to this attack.

But there’s good news, too. The attack requires physical access to a device. It’s not something that can be executed remotely over the Internet.

Plus, most people don’t set up a password for the bootloader in the first place. It seems a safe bet that the vast majority of systems, despite running Grub2, would not actually be at risk from this bug because they would have nothing to exploit.

It’s worth keeping in mind, too, that any attacker with physical access to a computer — no matter which operating system or bootloader it has installed — can usually access the data anyway easily enough. He could, for example, just take the hard disk out and plug it into another machine. Full-disk encryption is a defense against this vulnerability, but few people encrypt their disks.

All the same, this is a significant security bug since it could theoretically impact hundreds of millions of devices. Its disclosure is the latest reminder to the open source community that — as Linus Torvalds himself put it recently, to the Washington Post’s consternation — perfect security is impossible.

Read more about:

AgentsMSPsVARs/SIs

About the Author(s)

Christopher Tozzi

Contributing Editor

Christopher Tozzi started covering the channel for The VAR Guy on a freelance basis in 2008, with an emphasis on open source, Linux, virtualization, SDN, containers, data storage and related topics. He also teaches history at a major university in Washington, D.C. He occasionally combines these interests by writing about the history of software. His book on this topic, “For Fun and Profit: A History of the Free and Open Source Software Revolution,” is forthcoming with MIT Press.

Free Newsletters for the Channel
Register for Your Free Newsletter Now

You May Also Like