Microsoft Leverages Security Copilot to Detect 20 Vulnerabilities in Open-Source Bootloaders

Microsoft has utilized its artificial intelligence cybersecurity tool, Microsoft Security Copilot, to identify several previously unknown vulnerabilities in popular open-source bootloaders. Recently, the company announced a list of these security flaws discovered in three widely used bootloaders. One of these bootloaders serves as the default for numerous Linux-based systems, while the other two cater to embedded systems and Internet of Things (IoT) devices. Microsoft has already informed the maintainers of these bootloaders, who have since released security updates to address the identified issues.
Microsoft’s AI Vulnerability Discovery Process
In a blog post, Microsoft elaborated on the process of discovering these vulnerabilities and the potential risks they pose. The firm used its AI-driven security analysis tool, Security Copilot, designed to aid organizations in protecting against cyber threats and uncovering security weaknesses. The vulnerabilities were located in three key bootloaders: GRand Unified Bootloader version 2 (GRUB2), U-Boot, and Barebox, all of which are integral to operating systems and various devices.
Understanding Bootloaders
A bootloader is a compact program that operates before the operating system (OS) begins. It is responsible for loading the OS into memory and initiating the boot sequence. GRUB2 is the default bootloader for many Linux distributions, while U-Boot and Barebox are frequently employed in embedded systems and IoT devices.
Microsoft’s Threat Intelligence team discovered 11 vulnerabilities within GRUB2, including various issues like integer overflows, buffer overflows, and a cryptographic side-channel flaw. These vulnerabilities can potentially allow malicious actors to circumvent the Unified Extensible Firmware Interface (UEFI) Secure Boot, which aims to block unauthorized code execution during the boot process.
Vulnerabilities in U-Boot and Barebox
Security Copilot also uncovered nine vulnerabilities in U-Boot and Barebox. The primary issue here involves buffer overflows that impact file systems such as SquashFS, EXT4, CramFS, and JFFS2. It is crucial to note that, while a threat actor would need physical access to the device to exploit these vulnerabilities, the potential security risks remain significant.
Specifically regarding GRUB2, Microsoft indicated that attackers could exploit these vulnerabilities to install concealed bootkits remotely. This aspect is particularly alarming as bootkits can survive even after a user reinstalls the operating system or replaces their hard drive, making them a persistent threat.
Security Updates and User Recommendations
The development teams behind GRUB2, U-Boot, and Barebox have already issued security updates as of February to rectify these vulnerabilities. Users are strongly encouraged to update their systems to the latest versions to shield themselves against potential cyber threats. Keeping software and bootloaders up-to-date is a vital step in maintaining cybersecurity and safeguarding sensitive information from cybercriminals.