Wiz Agents & Workflows are here

CVE-2023-24932
vulnerability analysis and mitigation

Overview

A Secure Boot Security Feature Bypass vulnerability, tracked as CVE-2023-24932, was discovered involving the BlackLotus UEFI bootkit. This vulnerability affects all Windows devices with Secure Boot protections enabled. The issue was initially disclosed in May 2023, with mitigations included in Windows security updates released on or after July 9, 2024. The vulnerability requires physical or administrative access to the device to be exploited (Microsoft Support).

Technical details

The vulnerability involves a bootkit, which is a malicious program designed to load early in a device's boot sequence to control the operating system start. The issue specifically relates to the Secure Boot feature, which is designed to create a safe and trusted path from the Unified Extensible Firmware Interface (UEFI) through the Windows kernel Trusted Boot sequence. Fixing this vulnerability requires revoking boot managers and implementing new security measures including updating the Secure Boot DB (Signature Database) and DBX (Forbidden Signature Database) (Microsoft Support). The vulnerability has been assigned a CVSS v3.1 base score of 6.7 (Medium) with vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H (NVD).

Impact

If exploited, this vulnerability allows attackers who have gained administrative privileges or physical access to the device to maintain control over it through bootkit malware. The impact is particularly severe as it affects the boot sequence, potentially allowing attackers to persist even through operating system reinstallations. The vulnerability can be exploited through physical access or remotely, such as by using a hypervisor to access VMs/cloud (Microsoft Support).

Mitigation and workarounds

Microsoft has released comprehensive mitigations that include four key steps: 1) Installing updated certificate definitions to the DB, 2) Updating the boot manager, 3) Enabling revocation of older certificates, and 4) Applying Secure Version Number (SVN) updates to the firmware. These mitigations are included in Windows security updates released on or after July 9, 2024, but are not enabled by default. Organizations are advised to thoroughly test these mitigations in their environment before broad deployment, as they cannot be reverted once applied if Secure Boot remains enabled (Microsoft Support).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management