Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Artificial Intelligence

Microsoft Using AI to Uncover Critical Bootloader Vulnerabilities

Using the Security Copilot tool, Microsoft discovered 20 critical vulnerabilities in widely deployed open-source bootloaders.

Microsoft Copilot Risks

Researchers in Microsoft’s threat intelligence team say they are using AI technologies to uncover security vulnerabilities in popular open-source bootloaders, including GRUB2, U-boot, and Barebox. 

Using its Security Copilot tool, the Microsoft team pinpointed at least 20 critical vulnerabilities in open-source bootloaders (including GRUB2, U-boot, and Barebox) in UEFI Secure Boot systems and widely deployed in embedded and IoT devices.

“The vulnerabilities found in the GRUB2 bootloader (commonly used as a Linux bootloader) and U-boot and Barebox bootloaders (commonly used for embedded systems), could allow threat actors to gain and execute arbitrary code,” the company said.

The research project, which combined static code analysis, fuzzing, and AI-driven prompts, saved the research team nearly a week’s worth of manual effort and the company said the AI tool not only flagged potential issues but also helped pinpoint specific vulnerabilities that could be exploited to override critical security mechanisms. 

Redmond’s researchers focused on bootloader functionalities such as filesystem parsing, a common weak point where memory safety vulnerabilities exist. In one case, Microsoft’s threat-intel team discovered an integer overflow that could let attackers execute arbitrary code, potentially bypassing Secure Boot protections and installing stealthy bootkits. 

“Copilot also assisted in finding similar patterns in other files, ensuring comprehensive coverage and validation of our findings. This efficient process allowed us to confirm several additional vulnerabilities and extend our analysis to other bootloaders like U-boot and Barebox, which share code with GRUB2,” the company said. 

“The implications of installing such bootkits are significant, as this can grant threat actors complete control over the device, allowing them to control the boot process and operating system, compromise additional devices on the network, and pursue other malicious activities,” Microsoft said.

“It could result in persistent malware that remains intact even after an operating system reinstallation or a hard drive replacement.”

Advertisement. Scroll to continue reading.

While threat actors would likely require physical device access to exploit the U-boot or Barebox vulnerabilities, in the case of GRUB2, the vulnerabilities could further be exploited to bypass Secure Boot and install stealthy bootkits or potentially bypass other security mechanisms, such as BitLocker. 

Redmond said its researchers worked with GRUB2 maintainers on security updates released in mid-February.  Separately, U-boot and Barebox maintainers released updates on February 19, 2025.

The company held up the findings as a showcase of “efficiency, streamlined workflows, and improved capabilities” provided by AI-based products. 

Related: Google Brings AI Magic to Fuzz Testing With Eye-Opening Results

Related: OpenAI Offering $100K Bounties for Critical Vulnerabilities

Related: Can AI Early Warning Systems Reboot the Threat Intel Industry?

Related: AI Won’t Take This Job: Human Ingenuity Crucial to Red-Teaming

Written By

Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. He is a security community engagement expert who has built programs at major global brands, including Intel Corp., Bishop Fox and GReAT. Ryan is a founding-director of the Security Tinkerers non-profit, an advisor to early-stage entrepreneurs, and a regular speaker at security conferences around the world.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

Wendi Whitmore has taken the role of Chief Security Intelligence Officer at Palo Alto Networks.

Phil Venables, former CISO of Google Cloud, has joined Ballistic Ventures as a Venture Partner.

David Currie, former CISO of Nubank and Klarna, has been appointed CEO of Vaultree.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.