CVE-2024-26175

7.8 HIGH

📋 TL;DR

CVE-2024-26175 is a Secure Boot security feature bypass vulnerability that allows attackers to circumvent Secure Boot protections on affected systems. This could enable loading of untrusted or malicious code during the boot process. The vulnerability affects systems with Secure Boot enabled, primarily Windows devices.

💻 Affected Systems

Products:
  • Windows Secure Boot
Versions: Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, Windows Server 2022
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Secure Boot enabled. UEFI firmware must support Secure Boot. Virtual machines may also be affected if using virtual TPM/Secure Boot.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via bootkit or rootkit installation, allowing persistent malware that survives OS reinstallation and disk formatting.

🟠

Likely Case

Attackers bypass Secure Boot to load malicious drivers or boot components, enabling privilege escalation or persistence mechanisms.

🟢

If Mitigated

Attackers can bypass Secure Boot but still face other security layers like HVCI, memory protections, and application control policies.

🌐 Internet-Facing: LOW - Requires physical access or administrative privileges to exploit, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Malicious insiders or attackers with physical access could exploit this to establish persistence or bypass security controls.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires administrative privileges or physical access to the system. Attackers need to modify boot components or firmware settings.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: March 2024 security updates (KB5035853 for Windows 11, KB5035849 for Windows 10, etc.)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26175

Restart Required: Yes

Instructions:

1. Install March 2024 Windows security updates via Windows Update. 2. For enterprise: Deploy through WSUS, Microsoft Endpoint Configuration Manager, or Microsoft Intune. 3. Verify Secure Boot is still enabled after update. 4. Consider updating UEFI firmware if vendor provides updates.

🔧 Temporary Workarounds

Enable HVCI (Hypervisor-Protected Code Integrity)

windows

Adds additional memory integrity protections that can help mitigate exploitation even if Secure Boot is bypassed.

powershell -Command "Set-ProcessMitigation -System -Enable HypervisorEnforcedCodeIntegrity"

Enable Windows Defender Application Control

windows

Restricts which applications and code can run, providing defense-in-depth against malicious boot components.

Deploy via Group Policy or Intune: Computer Configuration > Administrative Templates > System > Device Guard

🧯 If You Can't Patch

  • Restrict physical access to critical systems and implement strict access controls
  • Enable BitLocker with TPM+PIN to protect against offline attacks even if Secure Boot is bypassed

🔍 How to Verify

Check if Vulnerable:

Check if March 2024 security updates are installed via: powershell "Get-HotFix | Where-Object {$_.HotFixID -like 'KB50358*'}"

Check Version:

powershell "systeminfo | findstr /B /C:"OS Name" /C:"OS Version""

Verify Fix Applied:

Verify Secure Boot status: powershell "Confirm-SecureBootUEFI" should return True, and check that March 2024 updates are installed.

📡 Detection & Monitoring

Log Indicators:

  • Event ID 1035 from Code Integrity in Windows Logs > Applications and Services > Microsoft > Windows > CodeIntegrity > Operational
  • Unexpected Secure Boot policy changes in System logs
  • Boot configuration changes in UEFI/BIOS logs

Network Indicators:

  • Not applicable - local exploitation only

SIEM Query:

EventID=1035 AND (Message contains "Secure Boot" OR Message contains "boot integrity")

🔗 References

📤 Share & Export