Researchers Uncover UEFI Secure Boot Bypass in 3 Microsoft Signed Boot Loaders

News

A security feature bypass vulnerability has been uncovered in three signed third-party Unified Extensible Firmware Interface (UEFI) boot loaders that allow bypass of the UEFI Secure Boot feature.

“These vulnerabilities can be exploited by mounting the EFI System Partition and replacing the existing bootloader with the vulnerable one, or modifying a UEFI variable to load the vulnerable loader instead of the existing one,” hardware security firm Eclypsium said in a report shared with The Hacker News.

CyberSecurity

The following vendor-specific boot loaders, which were signed and authenticated by Microsoft, have been found vulnerable to the bypass and have been patched as part of the tech giant’s Patch Tuesday update released this week –

Secure Boot is a security standard designed to thwart malicious programs from loading when a computer starts up (boots) and ensure only the software that is trusted by the Original Equipment Manufacturer (OEM) is launched.

“The firmware boot loaders boot the UEFI environment and hands over control to UEFI applications written by the SoC vendor, Microsoft, and OEMs,” Microsoft notes in its documentation. “The UEFI environment launches the Windows Boot Manager, which determines whether to boot to Full Flash Update (FFU) image flashing or device reset mode, to the update OS, or to the main OS.”

Boot Loaders

In a nutshell, successful exploitation of the flaws identified by Eclypsium could permit an adversary to circumvent security guardrails at startup and execute arbitrary unsigned code during the boot process.

This can have further knock-on effects, enabling a bad actor to gain entrenched access and establish persistence on a host through in a manner that can survive operating system reinstalls and hard drive replacements, not to mention completely bypassing detection by security software.

CyberSecurity

Calling CVE-2022-34302 “far more stealthy,” Eclypsium noted the New Horizon Datasys vulnerability is not only trivial to exploit in the wild, but can also “enable even more complex evasions such as disabling security handlers.”

Security handlers, for instance, can include Trusted Platform Module (TPM) measurements and signature checks, Eclypsium researchers Mickey Shkatov and Jesse Michael said.

It’s worth noting that exploiting these vulnerabilities requires an attacker to have administrator privileges, although gaining local privilege escalation is not insurmountable.

“Much like BootHole, these vulnerabilities highlight the challenges of ensuring the boot integrity of devices that rely on a complex supply chain of vendors and code working together,” the researchers concluded, adding “these issues highlight how simple vulnerabilities in third-party code can undermine the entire process.”

Products You May Like

Articles You May Like

Spyware Maker NSO Group Liable for WhatsApp User Hacks
Brazilian Hacker Charged for Extorting $3.2M in Bitcoin After Breaching 300,000 Accounts
US and Japan Blame North Korea for $308m Crypto Heist
LockBit Admins Tease a New Ransomware Version
AI Could Generate 10,000 Malware Variants, Evading Detection in 88% of Case

Leave a Reply

Your email address will not be published. Required fields are marked *