Introducing Wiz for Exposure Management: Unify, prioritize, and remediate exposures everywhere.

CVE-2025-3052
vulnerability analysis and mitigation

Overview

An arbitrary write vulnerability (CVE-2025-3052) was discovered in Microsoft signed UEFI firmware applications (DTBios and BiosFlashShell) from DTResearch. The vulnerability was disclosed on June 10, 2025, affecting systems that trust the Microsoft Corporation UEFI CA 2011 certificate. The vulnerability allows attackers to bypass UEFI Secure Boot through manipulation of NVRAM variables (BINARLY Advisory, CERT VU).

Technical details

The vulnerability exists in a UEFI application that improperly handles the NVRAM variable 'IhisiParamBuffer' (GUID: 92E59835-5F42-4E0B-9A84-47C7810EA806). When exploited, it allows an attacker to perform arbitrary memory writes, including modification of the global Security2 Architectural Protocol (gSecurity2) used for Secure Boot verification. The vulnerability has a CVSS v3.1 score of 8.2 (HIGH) with vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H (BINARLY Advisory).

Impact

The vulnerability enables attackers to bypass Secure Boot and execute untrusted code during the boot process. This allows the deployment of malicious UEFI bootkits before operating system initialization, potentially compromising system integrity, gaining elevated privileges, and evading detection by traditional security mechanisms. The impact is particularly severe as the attack occurs before OS-level security tools initialize (BINARLY Advisory).

Mitigation and workarounds

To remediate this vulnerability, the execution of affected UEFI applications must be prevented by adding their Authenticode hashes to the dbx (Forbidden Signature Database). Microsoft is releasing an updated DBX file to prevent vulnerable components from executing under Secure Boot. System administrators should apply vendor-provided software updates and ensure their systems have the latest DBX updates. For Linux users, updates are available through the Linux Vendor Firmware Service (LVFS) (CERT VU).

Community reactions

Multiple vendors have responded to this vulnerability. DT Research acknowledged the issue and agreed to revoke all Microsoft-signed binaries. GIGABYTE released a new BIOS version addressing the issue. Red Hat, while not directly shipping the affected applications, advised administrators to deploy updated DBX on UEFI systems. AMI announced they would execute their standard DBX integration workflow once updates become available (CERT VU).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management