CVE-2009-3525

Xen 3.0.3, 3.3.0, 3.3.1 - Unauthenticated Boot Parameter Modification via pyGrub

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2009-3525. PoCs published by Jan Lieskovsky.

AI-analyzed exploit summary This exploit demonstrates a local authentication bypass in Xen by modifying the 'grub.conf' file during the boot process. An attacker with physical access can interrupt the GRUB boot sequence to append a single-user mode flag, bypassing authentication.

Description

The pyGrub boot loader in Xen 3.0.3, 3.3.0, and Xen-3.3.1 does not support the password option in grub.conf for para-virtualized guests, which allows attackers with access to the para-virtualized guest console to boot the guest or modify the guest's kernel boot parameters without providing the expected password.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Jan Lieskovsky · textlocallinux
https://www.exploit-db.com/exploits/33255

This exploit demonstrates a local authentication bypass in Xen by modifying the 'grub.conf' file during the boot process. An attacker with physical access can interrupt the GRUB boot sequence to append a single-user mode flag, bypassing authentication.

Classification
Working Poc 90%
Attack Type
Auth Bypass
Complexity
Trivial
Reliability
Reliable
Target: Xen 3.0.3, 3.3.0, and 3.3.1
No auth needed
Prerequisites: Physical access to the affected host · Xen hypervisor with vulnerable versions
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (10)

Core 10
Core References
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/36523
Third Party Advisory, VDB Entry vdb-entry signature x_refsource_oval
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9466
Patch mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2009/09/25/1
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/36908
Exploit, Patch x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=525740#c0
Vendor Advisory vendor-advisory x_refsource_redhat
http://www.redhat.com/support/errata/RHSA-2009-1472.html
Third Party Advisory, VDB Entry vdb-entry x_refsource_sectrack
http://www.securitytracker.com/id?1022950
Exploit, Patch x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=525740

Scores

EPSS 0.0134
EPSS Percentile 80.2%

Details

CWE
CWE-264
Status published
Products (3)
xen/xen 3.0.3
xen/xen 3.3.0
xen/xen 3.3.1
Published Oct 05, 2009
Tracked Since Feb 18, 2026