CVE-2024-37978
vulnerability analysis and mitigation

Overview

A Secure Boot Security Feature Bypass Vulnerability (CVE-2024-37978) affects multiple versions of Microsoft Windows, including Windows 11 22H2, Windows 11 23H2, and Windows Server 2022 23H2. The vulnerability was initially disclosed on July 9, 2024, and has been assigned a high severity rating with a CVSS base score of 8.0 (NVD).

Technical details

The vulnerability has been classified as a Security Feature Bypass affecting the Secure Boot functionality. Microsoft has assigned it a CVSS v3.1 vector of CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H, indicating adjacent network attack vector, low attack complexity, no privileges required, and user interaction required. The vulnerability affects systems up to versions 10.0.22621.3880 for Windows 11 22H2, 10.0.22631.3880 for Windows 11 23H2, and 10.0.25398.1009 for Windows Server 2022 23H2 (NVD).

Impact

The vulnerability could potentially allow an attacker to bypass Secure Boot security features, which could compromise the system's secure boot process. This could lead to unauthorized code execution during the boot process and potentially compromise the system's security (Microsoft Security Response Center).

Mitigation and workarounds

Microsoft has released security updates to address this vulnerability. Users are advised to update to versions 10.0.22621.3880 or later for Windows 11 22H2, 10.0.22631.3880 or later for Windows 11 23H2, and 10.0.25398.1009 or later for Windows Server 2022 23H2 (NVD).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management