Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Samsung launches Galaxy Z Fold7, Z Flip7 and Z Flip7 FE

    Samsung launches Galaxy Watch8 series

    FTC’s ‘click to cancel’ subscription rules thrown out by judges

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      Apple sued by shareholders for allegedly overstating AI progress

      June 22, 2025

      How far will AI go to defend its own survival?

      June 2, 2025

      The internet thinks this video from Gaza is AI. Here’s how we proved it isn’t.

      May 30, 2025

      Nvidia CEO hails Trump’s plan to rescind some export curbs on AI chips to China

      May 22, 2025

      AI poses a bigger threat to women’s work, than men’s, report says

      May 21, 2025
    • Business

      Cloudflare open-sources Orange Meets with End-to-End encryption

      June 29, 2025

      Google links massive cloud outage to API management issue

      June 13, 2025

      The EU challenges Google and Cloudflare with its very own DNS resolver that can filter dangerous traffic

      June 11, 2025

      These two Ivanti bugs are allowing hackers to target cloud instances

      May 21, 2025

      How cloud and AI transform and improve customer experiences

      May 10, 2025
    • Crypto

      Bitget Partners With UNTOLD Festival, Where Web3 Takes The Main Stage

      July 9, 2025

      Dogecoin (DOGE) Price Nears Key Resistance Again: Rally Or Another Rejection?

      July 9, 2025

      Fidelity Fuels Ethereum Buzz, But Bitcoin Sell Risk Stalls ETH Rally

      July 9, 2025

      BONK Jumps 60 % in a Week—Will Golden Cross Power a Breakout?

      July 9, 2025

      Crypto Firms in South Korea Could Soon Benefit from Government Subsidies and Tax Breaks

      July 9, 2025
    • Technology

      FTC’s ‘click to cancel’ subscription rules thrown out by judges

      July 9, 2025

      I put up these holiday lights last year—and they’re not coming down

      July 9, 2025

      Perplexity debuts Comet, a free AI browser (that currently costs $200)

      July 9, 2025

      I found the 10 best Prime Day PC tech deals under $50

      July 9, 2025

      Best Prime Day deals on Chromebooks (July 9)

      July 9, 2025
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Shop Now
    Tech AI Verse
    You are at:Home»Technology»Found in the wild: 2 Secure Boot exploits. Microsoft is patching only 1 of them.
    Technology

    Found in the wild: 2 Secure Boot exploits. Microsoft is patching only 1 of them.

    TechAiVerseBy TechAiVerseJune 11, 2025No Comments5 Mins Read0 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Found in the wild: 2 Secure Boot exploits. Microsoft is patching only 1 of them.
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Found in the wild: 2 Secure Boot exploits. Microsoft is patching only 1 of them.


    Skip to content





    A skeleton key for hackers

    The publicly available exploits provide a near-universal way to bypass key protections.

    Researchers have unearthed two publicly available exploits that completely evade protections offered by Secure Boot, the industry-wide mechanism for ensuring devices load only secure operating system images during the boot-up process. Microsoft is taking action to block one exploit and allowing the other one to remain a viable threat.

    As part of Tuesday’s monthly security update routine, Microsoft patched CVE-2025-3052, a Secure Boot bypass vulnerability affecting more than 50 device makers. More than a dozen modules that allow devices from these manufacturers to run on Linux allow an attacker with physical access to turn off Secure Boot and, from there, go on to install malware that runs before the operating system loads. Such “evil maid” attacks are precisely the threat Secure Boot is designed to prevent. The vulnerability can also be exploited remotely to make infections stealthier and more powerful if an attacker has already gained administrative control of a machine.

    A single point of failure

    The underlying cause of the vulnerability is a critical vulnerability in a tool used to flash firmware images on the motherboards of devices sold by DT Research, a manufacturer of rugged mobile devices. It has been available on VirusTotal since last year and was digitally signed in 2022, an indication it has been available through other channels since at least that earlier date.

    Although the module was intended to run on DT Research devices only, most machines running either Windows or Linux will execute it during the boot-up process. That’s because the module is authenticated by “Microsoft Corporation UEFI CA 2011,” a cryptographic certificate that’s signed by Microsoft and comes preinstalled on affected machines. The purpose of the certificate is to authenticate so-called shims for loading Linux. Manufacturers install it on their devices to ensure they’re compatible with Linux. The patch Microsoft released Tuesday adds cryptographic hashes for 14 separate variants of the DT Research tool to a block list stored in the DBX, a database listing signed modules that have been revoked or are otherwise untrusted.

    “This discovery underscores how a single vendor misstep can ripple across the entire UEFI supply chain, and why forward-leaning orgs are investing in continuous binary-level scanning and rapid dbx rollouts instead of relying on the once-a-year ‘secure-BIOS-update’ ritual,” said Alex Matrosov, CEO and founder of Binarly, the security firm that discovered the Secure Boot exploit. UEFI is short for Unified Extensible Firmware Interface, the motherboard-resident firmware that replaced the BIOS.

    Binarly assigned a severity rating of 8.2 out of a possible 10 to CVE-2025-3052. Microsoft’s rating is 3.1. The vulnerability also received a patch on Tuesday from Red Hat and other distributors of Linux operating systems.

    Introduced more than a decade ago by a consortium of companies, Secure Boot uses public-key cryptography to block the loading of any code during the boot-up process that isn’t signed with a pre-approved digital signature. It establishes a chain of trust between the hardware and software or firmware that boots up a device. Each link in this chain must be digitally signed with a certificate authorized by the device manufacturer. Microsoft requires it to be on by default. Some certification programs mandated by various governments also require Secure Boot protections to be in place.

    But wait, there’s more

    The second publicly available Secure Boot exploit was discovered by researcher Zack Didcott. As he reported earlier this month, CVE-2025-47827 stems from IGEL, a Linux kernel module for handling their proprietary logical volume management. The initial shim, which loads GRUB and the vulnerable kernel, is signed by Microsoft.

    Attackers with even brief physical access to a device can boot it up in IGEL and then modify the boot loader to install malware. Didcott said he reported the vulnerability to Microsoft and has received no indication the company has plans to revoke the signature. Microsoft didn’t respond to emails seeking confirmation and the reason for its decision.

    Researchers at Eclypsium, a firm specializing in firmware security, said the module provides a near-universal means for bypassing Secure Boot protections.

    “Because Microsoft’s 3rd Party UEFI CA is trusted by almost all PC-like devices, an unrevoked vulnerability in any of the components verified with that key… allows you to break Secure Boot to load an untrusted OS,” one of the researchers, Jesse Michael, wrote in an email. “Any system that trusts the Microsoft 3rd Party UEFI CA will load and run their version of the shim, which has been signed by that key. Their shim will then use its own embedded key to verify the IGEL-signed kernel+initramfs and malicious rootfs, which can be modified to chain-load another operating system such as Windows or a different version of Linux.”

    Aside from installing patches issued by Microsoft and others, there isn’t much users can do to shore up Secure Boot protection. Of course, people can take extra precautions to physically secure their devices, but the entire point of Secure Boot is to minimize threats stemming from evil maid scenarios.

    Dan Goodin is Senior Security Editor at Ars Technica, where he oversees coverage of malware, computer espionage, botnets, hardware hacking, encryption, and passwords. In his spare time, he enjoys gardening, cooking, and following the independent music scene. Dan is based in San Francisco. Follow him at here on Mastodon and here on Bluesky. Contact him on Signal at DanArs.82.



    25 Comments

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleOpenAI signs surprise deal with Google Cloud despite fierce AI rivalry
    Next Article FCC threat to revoke EchoStar spectrum licenses draws widespread backlash
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    FTC’s ‘click to cancel’ subscription rules thrown out by judges

    July 9, 2025

    I put up these holiday lights last year—and they’re not coming down

    July 9, 2025

    Perplexity debuts Comet, a free AI browser (that currently costs $200)

    July 9, 2025
    Leave A Reply Cancel Reply

    Top Posts

    New Akira ransomware decryptor cracks encryptions keys using GPUs

    March 16, 202527 Views

    OpenAI details ChatGPT-o3, o4-mini, o4-mini-high usage limits

    April 19, 202522 Views

    Rsync replaced with openrsync on macOS Sequoia

    April 7, 202519 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 202517 Views
    Don't Miss
    Gadgets July 10, 2025

    Samsung launches Galaxy Z Fold7, Z Flip7 and Z Flip7 FE

    Samsung launches Galaxy Z Fold7, Z Flip7 and Z Flip7 FE Samsung has officially launched…

    Samsung launches Galaxy Watch8 series

    FTC’s ‘click to cancel’ subscription rules thrown out by judges

    I put up these holiday lights last year—and they’re not coming down

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Samsung launches Galaxy Z Fold7, Z Flip7 and Z Flip7 FE

    July 10, 20252 Views

    Samsung launches Galaxy Watch8 series

    July 10, 20252 Views

    FTC’s ‘click to cancel’ subscription rules thrown out by judges

    July 9, 20252 Views
    Most Popular

    Ethereum must hold $2,000 support or risk dropping to $1,850 – Here’s why

    March 12, 20250 Views

    Xiaomi 15 Ultra Officially Launched in China, Malaysia launch to follow after global event

    March 12, 20250 Views

    Apple thinks people won’t use MagSafe on iPhone 16e

    March 12, 20250 Views
    © 2025 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.