
Cloud Vulnerability DB
A community-led vulnerabilities database
A Secure Boot Security Feature Bypass vulnerability, tracked as CVE-2023-24932, was discovered involving the BlackLotus UEFI bootkit. This vulnerability affects all Windows devices with Secure Boot protections enabled. The issue was initially disclosed in May 2023, with mitigations included in Windows security updates released on or after July 9, 2024. The vulnerability requires physical or administrative access to the device to be exploited (Microsoft Support).
The vulnerability involves a bootkit, which is a malicious program designed to load early in a device's boot sequence to control the operating system start. The issue specifically relates to the Secure Boot feature, which is designed to create a safe and trusted path from the Unified Extensible Firmware Interface (UEFI) through the Windows kernel Trusted Boot sequence. Fixing this vulnerability requires revoking boot managers and implementing new security measures including updating the Secure Boot DB (Signature Database) and DBX (Forbidden Signature Database) (Microsoft Support). The vulnerability has been assigned a CVSS v3.1 base score of 6.7 (Medium) with vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H (NVD).
If exploited, this vulnerability allows attackers who have gained administrative privileges or physical access to the device to maintain control over it through bootkit malware. The impact is particularly severe as it affects the boot sequence, potentially allowing attackers to persist even through operating system reinstallations. The vulnerability can be exploited through physical access or remotely, such as by using a hypervisor to access VMs/cloud (Microsoft Support).
Microsoft has released comprehensive mitigations that include four key steps: 1) Installing updated certificate definitions to the DB, 2) Updating the boot manager, 3) Enabling revocation of older certificates, and 4) Applying Secure Version Number (SVN) updates to the firmware. These mitigations are included in Windows security updates released on or after July 9, 2024, but are not enabled by default. Organizations are advised to thoroughly test these mitigations in their environment before broad deployment, as they cannot be reverted once applied if Secure Boot remains enabled (Microsoft Support).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."