Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-1tdk-6d8a-m7h8
Vulnerability ID VCID-1tdk-6d8a-m7h8
Aliases CVE-2025-61662
Summary grub2: Missing unregister call for gettext command may lead to use-after-free
Status Published
Exploitability 0.5
Weighted Severity 7.0
Risk 3.5
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
System Score Found at
cvssv3.1 7.8 https://access.redhat.com/errata/RHSA-2026:4648
ssvc Track https://access.redhat.com/errata/RHSA-2026:4648
cvssv3.1 7.8 https://access.redhat.com/errata/RHSA-2026:4649
ssvc Track https://access.redhat.com/errata/RHSA-2026:4649
cvssv3.1 7.8 https://access.redhat.com/errata/RHSA-2026:4652
ssvc Track https://access.redhat.com/errata/RHSA-2026:4652
cvssv3.1 7.8 https://access.redhat.com/errata/RHSA-2026:4653
ssvc Track https://access.redhat.com/errata/RHSA-2026:4653
cvssv3.1 7.8 https://access.redhat.com/errata/RHSA-2026:4654
ssvc Track https://access.redhat.com/errata/RHSA-2026:4654
cvssv3.1 7.8 https://access.redhat.com/errata/RHSA-2026:4760
ssvc Track https://access.redhat.com/errata/RHSA-2026:4760
cvssv3.1 7.8 https://access.redhat.com/errata/RHSA-2026:4822
ssvc Track https://access.redhat.com/errata/RHSA-2026:4822
cvssv3.1 7.8 https://access.redhat.com/errata/RHSA-2026:4823
ssvc Track https://access.redhat.com/errata/RHSA-2026:4823
cvssv3.1 7.8 https://access.redhat.com/errata/RHSA-2026:4830
ssvc Track https://access.redhat.com/errata/RHSA-2026:4830
cvssv3.1 7.8 https://access.redhat.com/errata/RHSA-2026:4900
ssvc Track https://access.redhat.com/errata/RHSA-2026:4900
cvssv3.1 7.8 https://access.redhat.com/errata/RHSA-2026:4998
ssvc Track https://access.redhat.com/errata/RHSA-2026:4998
cvssv3.1 7.8 https://access.redhat.com/errata/RHSA-2026:5074
ssvc Track https://access.redhat.com/errata/RHSA-2026:5074
cvssv3.1 7.8 https://access.redhat.com/errata/RHSA-2026:5127
ssvc Track https://access.redhat.com/errata/RHSA-2026:5127
cvssv3.1 7.8 https://access.redhat.com/errata/RHSA-2026:5233
ssvc Track https://access.redhat.com/errata/RHSA-2026:5233
cvssv3.1 7.8 https://access.redhat.com/errata/RHSA-2026:6492
ssvc Track https://access.redhat.com/errata/RHSA-2026:6492
cvssv3.1 7.8 https://access.redhat.com/errata/RHSA-2026:7239
ssvc Track https://access.redhat.com/errata/RHSA-2026:7239
cvssv3.1 7.8 https://access.redhat.com/errata/RHSA-2026:7243
ssvc Track https://access.redhat.com/errata/RHSA-2026:7243
cvssv3 7.8 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-61662.json
cvssv3.1 7.8 https://access.redhat.com/security/cve/CVE-2025-61662
ssvc Track https://access.redhat.com/security/cve/CVE-2025-61662
epss 0.00012 https://api.first.org/data/v1/epss?cve=CVE-2025-61662
epss 0.00012 https://api.first.org/data/v1/epss?cve=CVE-2025-61662
epss 0.00012 https://api.first.org/data/v1/epss?cve=CVE-2025-61662
epss 0.00012 https://api.first.org/data/v1/epss?cve=CVE-2025-61662
epss 0.00012 https://api.first.org/data/v1/epss?cve=CVE-2025-61662
epss 0.00012 https://api.first.org/data/v1/epss?cve=CVE-2025-61662
epss 0.00012 https://api.first.org/data/v1/epss?cve=CVE-2025-61662
epss 0.00012 https://api.first.org/data/v1/epss?cve=CVE-2025-61662
epss 0.00012 https://api.first.org/data/v1/epss?cve=CVE-2025-61662
epss 0.00012 https://api.first.org/data/v1/epss?cve=CVE-2025-61662
cvssv3.1 7.8 https://bugzilla.redhat.com/show_bug.cgi?id=2414683
ssvc Track https://bugzilla.redhat.com/show_bug.cgi?id=2414683
cvssv3.1 4.9 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 7.8 https://lists.gnu.org/archive/html/grub-devel/2025-11/msg00155.html
ssvc Track https://lists.gnu.org/archive/html/grub-devel/2025-11/msg00155.html
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-61662.json
https://api.first.org/data/v1/epss?cve=CVE-2025-61662
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61662
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
1120968 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1120968
2414683 https://bugzilla.redhat.com/show_bug.cgi?id=2414683
cpe:/a:redhat:openshift:4.12::el8 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.12::el8
cpe:/a:redhat:openshift:4.13::el9 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.13::el9
cpe:/a:redhat:openshift:4.18::el9 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.18::el9
cpe:/a:redhat:openshift:4.19::el9 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.19::el9
cpe:/o:redhat:enterprise_linux:10.1 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
cpe:/o:redhat:enterprise_linux:8::baseos https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
cpe:/o:redhat:enterprise_linux:9::baseos https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
cpe:/o:redhat:enterprise_linux_eus:10.0 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux_eus:10.0
cpe:/o:redhat:rhel_aus:8.2::baseos https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
cpe:/o:redhat:rhel_aus:8.4::baseos https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
cpe:/o:redhat:rhel_aus:8.6::baseos https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
cpe:/o:redhat:rhel_e4s:8.6::baseos https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
cpe:/o:redhat:rhel_e4s:8.8::baseos https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.8::baseos
cpe:/o:redhat:rhel_e4s:9.0::baseos https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.0::baseos
cpe:/o:redhat:rhel_e4s:9.2::baseos https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
cpe:/o:redhat:rhel_els:7 https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
cpe:/o:redhat:rhel_eus:9.4::baseos https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
cpe:/o:redhat:rhel_eus:9.6::baseos https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.6::baseos
cpe:/o:redhat:rhel_eus_long_life:8.4::baseos https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
cpe:/o:redhat:rhel_tus:8.6::baseos https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
cpe:/o:redhat:rhel_tus:8.8::baseos https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.8::baseos
CVE-2025-61662 https://access.redhat.com/security/cve/CVE-2025-61662
msg00155.html https://lists.gnu.org/archive/html/grub-devel/2025-11/msg00155.html
RHSA-2026:4648 https://access.redhat.com/errata/RHSA-2026:4648
RHSA-2026:4649 https://access.redhat.com/errata/RHSA-2026:4649
RHSA-2026:4652 https://access.redhat.com/errata/RHSA-2026:4652
RHSA-2026:4653 https://access.redhat.com/errata/RHSA-2026:4653
RHSA-2026:4654 https://access.redhat.com/errata/RHSA-2026:4654
RHSA-2026:4760 https://access.redhat.com/errata/RHSA-2026:4760
RHSA-2026:4822 https://access.redhat.com/errata/RHSA-2026:4822
RHSA-2026:4823 https://access.redhat.com/errata/RHSA-2026:4823
RHSA-2026:4830 https://access.redhat.com/errata/RHSA-2026:4830
RHSA-2026:4900 https://access.redhat.com/errata/RHSA-2026:4900
RHSA-2026:4998 https://access.redhat.com/errata/RHSA-2026:4998
RHSA-2026:5074 https://access.redhat.com/errata/RHSA-2026:5074
RHSA-2026:5127 https://access.redhat.com/errata/RHSA-2026:5127
RHSA-2026:5233 https://access.redhat.com/errata/RHSA-2026:5233
RHSA-2026:6492 https://access.redhat.com/errata/RHSA-2026:6492
RHSA-2026:7239 https://access.redhat.com/errata/RHSA-2026:7239
RHSA-2026:7243 https://access.redhat.com/errata/RHSA-2026:7243
No exploits are available.
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:4648
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-18T18:44:47Z/ Found at https://access.redhat.com/errata/RHSA-2026:4648
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:4649
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-18T18:44:47Z/ Found at https://access.redhat.com/errata/RHSA-2026:4649
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:4652
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-18T18:44:47Z/ Found at https://access.redhat.com/errata/RHSA-2026:4652
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:4653
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-18T18:44:47Z/ Found at https://access.redhat.com/errata/RHSA-2026:4653
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:4654
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-18T18:44:47Z/ Found at https://access.redhat.com/errata/RHSA-2026:4654
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:4760
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-18T18:44:47Z/ Found at https://access.redhat.com/errata/RHSA-2026:4760
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:4822
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-18T18:44:47Z/ Found at https://access.redhat.com/errata/RHSA-2026:4822
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:4823
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-18T18:44:47Z/ Found at https://access.redhat.com/errata/RHSA-2026:4823
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:4830
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-18T18:44:47Z/ Found at https://access.redhat.com/errata/RHSA-2026:4830
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:4900
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-18T18:44:47Z/ Found at https://access.redhat.com/errata/RHSA-2026:4900
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:4998
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-18T18:44:47Z/ Found at https://access.redhat.com/errata/RHSA-2026:4998
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:5074
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-18T18:44:47Z/ Found at https://access.redhat.com/errata/RHSA-2026:5074
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:5127
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-18T18:44:47Z/ Found at https://access.redhat.com/errata/RHSA-2026:5127
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:5233
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-18T18:44:47Z/ Found at https://access.redhat.com/errata/RHSA-2026:5233
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:6492
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-18T18:44:47Z/ Found at https://access.redhat.com/errata/RHSA-2026:6492
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:7239
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-18T18:44:47Z/ Found at https://access.redhat.com/errata/RHSA-2026:7239
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/errata/RHSA-2026:7243
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-18T18:44:47Z/ Found at https://access.redhat.com/errata/RHSA-2026:7243
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-61662.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/security/cve/CVE-2025-61662
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-18T18:44:47Z/ Found at https://access.redhat.com/security/cve/CVE-2025-61662
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://bugzilla.redhat.com/show_bug.cgi?id=2414683
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-18T18:44:47Z/ Found at https://bugzilla.redhat.com/show_bug.cgi?id=2414683
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Found at https://lists.gnu.org/archive/html/grub-devel/2025-11/msg00155.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-18T18:44:47Z/ Found at https://lists.gnu.org/archive/html/grub-devel/2025-11/msg00155.html
Exploit Prediction Scoring System (EPSS)
Percentile 0.01492
EPSS Score 0.00012
Published At April 2, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T13:34:57.155801+00:00 RedHat Importer Import https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-61662.json 38.0.0