Use the following PowerShell commands (run with elevated permissions) to check whether you’re affected by the vulnerability and if the necessary revocations were installed on your system:
# UEFI systems; returns True if your system is affected by the CVE-2024-7344
[System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI db).bytes) -match 'Microsoft Corporation UEFI CA 2011'
# 64-bit UEFI systems; returns True if you’re protected (the vulnerable driver is revoked on your system)
[BitConverter]::ToString((Get-SecureBootUEFI dbx).bytes) -replace '-' -match 'cdb7c90d3ab8833d5324f5d8516d41fa990b9ca721fe643fffaef9057d9f9e48'
# 32-bit UEFI systems; returns True if you’re protected (the vulnerable driver is revoked on your system)
[BitConverter]::ToString((Get-SecureBootUEFI dbx).bytes) -replace '-' -match 'e9e4b5a51f6a5575b9f5bfab1852b0cb2795c66ff4b28135097cba671a5491b9'
For Linux systems, updates should be available through the Linux Vendor Firmware Service. Use the following commands to check whether the necessary revocations are installed on your system:
dbxtool --list | grep 'cdb7c90d3ab8833d5324f5d8516d41fa990b9ca721fe643fffaef9057d9f9e48'
dbxtool --list | grep 'e9e4b5a51f6a5575b9f5bfab1852b0cb2795c66ff4b28135097cba671a5491b9'
Uggh. I just ran these on my win 10 & win 11 systems, both are showing vulnerable (first check) and unprotected (driver is not revoked). And Windows Update has nothing for me--on either system. I guess we just wait? Some more?If you are interested in checking your systems (Windows or Linux), you can follow the guidelines from WeLiveSecurity.com.
Vetting things costs money and requires qualified personnel. =)What is the point of a chain of trust if you can't trust the entity holding the signing keys is actually vetting things? Or even trust them to revoke a maliciously-obtained signature in a timely fashion?
Mine is showing "true" for both.If you are interested in checking your systems (Windows or Linux), you can follow the guidelines from WeLiveSecurity.com.
Mine is showing Variable is currently undefined: for both. So... me too?Mine is showing "true" for both.
So, I guess that I am vulnerable yet not vulnerable...
Schrödinger's CVE?Mine is showing "true" for both.
So, I guess that I am vulnerable yet not vulnerable...
The OS update is likely just going to be to add new entries into the UEFI secure boot dbx database, which lists the hashes or public keys of things which are not allowed to be run even if they are properly signed. It's basically a revocation list, but for EFI executables.What gets me is that this had to be solved with an OS patch, which suggests software workarounds are an inevitable problem for it in the future. While I will still be using this on servers that exclusively run Windows, just for that little bit of extra security, at the end of the day considering a system already needs to be compromised, this is mainly a threat of making that compromise harder to remove.
My house is completely unaffected by lock picking. It doesn't have any locks! /sHey Dan, read your stuff (daily) and enjoy it. Here's something I don't get:
How do you have "privileged access to a device during bootup" BEFORE... the OS has loaded? I'm a Linux guy and normally would just ignore this as YAWB but seriously if I'm ABOUT to load Linux... then this is YA[UEFI]B.
UEFI is a problem to a solution nobody asked for. Just add TPM and trusted boot and MS signatures and OMG we have a 20 year old problem.
But sure, maybe I don't understand. Focus on MS patching YAP on YA[UEFI]B on a TPM that has never worked.
My 2005 personal laptops boot linux... run quickly... and can not physically be attacked by these methods. Sure, they are 20 years old. So am I.
I think you'll find that feature is nothing to do with MacOS itself but of the Apple designed and built, proprietary hardware, something Apple control which makes these things very simple to implement.Windows really is such garbage compared to Mac OS. With that computer if you wipe the drive it just detects your wifi, downloads the OS, and installs it. No screwing around with firmware settings. Windows? If it's an old computer (4 years old or older) you could be screwing around with it for hours just to install an OS.
Ignoring the rest of the comment, the statement was "...the vulnerability made it possible for attackers who had already gained privileged access to a device to run malicious firmware during bootup..."How do you have "privileged access to a device during bootup" BEFORE... the OS has loaded? I'm a Linux guy and normally would just ignore this as YAWB but seriously if I'm ABOUT to load Linux... then this is YA[UEFI]B.
Basically every system with secure boot enabled will show 'true' for the first check. It's not entirely accurate to say that makes you vulnerable to this*.If you are interested in checking your systems (Windows or Linux), you can follow the guidelines from WeLiveSecurity.com.
$UEFI2011CertInDB = [System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI db).bytes) -match 'Microsoft Corporation UEFI CA 2011'
$UEFI2011CertInDBx = [System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI dbx).bytes) -match 'Microsoft Corporation UEFI CA 2011'
$UEFI2011CertTrusted = ($UEFI2011CertInDB -and (-not $UEFI2011CertInDBx))
$Vulnerable64BitBootloaderBlocked = [BitConverter]::ToString((Get-SecureBootUEFI dbx).bytes) -replace '-' -match 'cdb7c90d3ab8833d5324f5d8516d41fa990b9ca721fe643fffaef9057d9f9e48'
$Vulnerable32BitBootloaderBlocked = [BitConverter]::ToString((Get-SecureBootUEFI dbx).bytes) -replace '-' -match 'e9e4b5a51f6a5575b9f5bfab1852b0cb2795c66ff4b28135097cba671a5491b9'
If ( $UEFI2011CertTrusted ) {
If ( -not $Vulnerable64BitBootloaderBlocked ) {
Write-Output "Your system trusts the vulnerable 64-bit bootloader from CVE-2024-7344"
} else {
Write-Output "Your system does not trust the vulnerable 64-bit bootloader from CVE-2024-7344"
}
If ( -not $Vulnerable32BitBootloaderBlocked) {
Write-Output "Your system trusts the vulnerable 32-bit bootloader from CVE-2024-7344"
} else {
Write-Output "Your system does not trust the vulnerable 32-bit bootloader from CVE-2024-7344"
}
} else {
Write-Output "Your system does not trust the 'Microsoft Corporation UEFI CA 2011' cert, so your system does not trust either of the vulnerable bootloaders from CVE-2024-7344"
}
I have this update installed, but I'm failing all the checks using the scripts posted here.It updates the dbx (blacklist) database. Yes, the dbx is resistant to downgrade attacks.
The fix is in the January 2025 roll-up which is for all supported versions of Windows. There are direct download links here.
Yes, there is a defined process for updating the db or dbx databases, it is defined in the UEFI spec and such database changes are protected by the KEK or PK keys. See UEFI spec 2.11 section 32.5.3 (page 1550) for details. The EFI system partition is not a part of the process, you directly manipulate EFI variables which most modern operating systems expose and can interact with.Is there a defined and required mechanism for UEFI firmware to ingest a suitably signed updated db/dbx file from a location available to both the OS and the firmware(presumably the EFI partition)?
I believe you CAN output a signed update file, and load it from a UEFI shell from the EFI System Partition (ESP) or any other partition the EFI firmware can read (some OEMs have paid for an NTFS and/or exFat license so they can add a driver to read those partition types too). I believe this is how I did it when adding my own cert to the PK on a system I was doing some secure boot work on. I then used a similar file to add the cert to the DB, by signing it with the cert I added to the PK, and using a linux utility to load the signed 'update' file.Yes, there is a defined process for updating the db or dbx databases, it is defined in the UEFI spec and such database changes are protected by the KEK or PK keys. See UEFI spec 2.11 section 32.5.3 (page 1550) for details. The EFI system partition is not a part of the process, you directly manipulate EFI variables which most modern operating systems expose and can interact with.
Fair question. This is deregulation - MSFT has to trust the vendor. There's probably a little dance the vendor has to go through - name rank serial number, maybe even an ISO certification. MSFT probably has some automated tools they run looking for known issues, and the rest is "is this a known entity?" and if so they stamp it Approved!What is the point of a chain of trust if you can't trust the entity holding the signing keys is actually vetting things? Or even trust them to revoke a maliciously-obtained signature in a timely fashion?
There IS a code review, but they offload it to third parties:Fair question. This is deregulation - MSFT has to trust the vendor. There's probably a little dance the vendor has to go through - name rank serial number, maybe even an ISO certification. MSFT probably has some automated tools they run looking for known issues, and the rest is "is this a known entity?" and if so they stamp it Approved!
There's a chain. They vetted it. I doubt it's a full code review though, or pen-test like.
Thank you! Much better version. Below is the confirmation from my computer running Windows 11 Pro WorkstationBasically every system with secure boot enabled will show 'true' for the first check. It's not entirely accurate to say that makes you vulnerable to this*.
*: defining 'this' as the specific vulnerable bootloader.
A more accurate check:
Code:$UEFI2011CertInDB = [System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI db).bytes) -match 'Microsoft Corporation UEFI CA 2011' $UEFI2011CertInDBx = [System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI dbx).bytes) -match 'Microsoft Corporation UEFI CA 2011' $UEFI2011CertTrusted = ($UEFI2011CertInDB -and (-not $UEFI2011CertInDBx)) $Vulnerable64BitBootloaderBlocked = [BitConverter]::ToString((Get-SecureBootUEFI dbx).bytes) -replace '-' -match 'cdb7c90d3ab8833d5324f5d8516d41fa990b9ca721fe643fffaef9057d9f9e48' $Vulnerable32BitBootloaderBlocked = [BitConverter]::ToString((Get-SecureBootUEFI dbx).bytes) -replace '-' -match 'e9e4b5a51f6a5575b9f5bfab1852b0cb2795c66ff4b28135097cba671a5491b9' If ( $UEFI2011CertTrusted ) { If ( -not $Vulnerable64BitBootloaderBlocked ) { Write-Output "Your system trusts the vulnerable 64-bit bootloader from CVE-2024-7344" } else { Write-Output "Your system does not trust the vulnerable 64-bit bootloader from CVE-2024-7344" } If ( -not $Vulnerable32BitBootloaderBlocked) { Write-Output "Your system trusts the vulnerable 32-bit bootloader from CVE-2024-7344" } else { Write-Output "Your system does not trust the vulnerable 32-bit bootloader from CVE-2024-7344" } } else { Write-Output "Your system does not trust the 'Microsoft Corporation UEFI CA 2011' cert, so your system does not trust either of the vulnerable bootloaders from CVE-2024-7344" }
Now, on to too much detail about why this is going to be a major fustercluck to really remediate:
It does not seem that most UEFI firmwares can handle dual-signed bootloaders. So any given bootloader can only be signed by the older 2011 cert, or the newer 2023 cert.
And we already know of SO MANY vulnerable bootloaders signed by one of the 2011 certs (there are vulnerable Windows bootloaders too, not just third-party ones) that we can't add all their hashes to the DBX.. the storage space isn't large enough. <InsertLaugh/Cry emoji here>
So, microsoft has to move everyone to using the newer 2023 certs. This isn't a huge deal on systems that are already installed and running. But the big gotcha comes when you need to reimage the systems: Your Windows (or Linux) install media uses a bootloader signed by one of the two. Old or new, not both.
If Microsoft just wanted to get this fixed ASAP, and released a windows update that enrolled EVERYONE's UEFI with the 2023 Certs (which they are going to do, if they haven't already*), and then also had code that would revoke the 2011 certs (adding them to the DBX in the local firmware)... well, these would all be fixed.
But next time you need to reimage the system, or use the firmware update disk from your hard drive manufacturer, or whatever... if that isn't updated to a bootloader that has been signed by the 2023 certs, you'll have to disable secure boot to run it. Maybe that isn't a big deal for the individual home user, but this is going to be a major hassle for IT departments everywhere. Especially if they restrict the firmware admin passwords, so the average tech who could plug in their imaging USB key and reimage can't just go in and disable it themselves.
And if you have something like what I have: A usb key with bootable rescue tools on it.. again, its primary bootloader can only be signed by either the old cert or the new one. So you're going to probably keep the old cert as long as possible, but eventually switch to the new cert.. hopefully before microsoft revokes the old certs.
*: Note, that KB article claims it started rolling out last year. But I have yet to see a system enroll the 2023 certs automatically (until maybe today - I have a Microsoft Surface that I don't think had the 2023 certs a few weeks ago, but does today.. but it still trusts the 2011 cert just fine as well).
Yep, I finally got one of mine to apply the dbx update as well, and it reports the same.Thank you! Much better version. Below is the confirmation from my computer running Windows 11 Pro Workstation
Your system does not trust the vulnerable 64-bit bootloader from CVE-2024-7344
Your system trusts the vulnerable 32-bit bootloader from CVE-2024-7344
Mine is showing "true" for both.
So, I guess that I am vulnerable yet not vulnerable...
bcdedit /set {bootmgr} flightsigning off
bcdedit /set nointegritychecks off
Ubuntu (and most major distros) work out of the box with SecureBootand doing so is far more clunky than "it just works" Windows