CVE-2024-26184

6.8 MEDIUM

📋 TL;DR

CVE-2024-26184 is a Secure Boot security feature bypass vulnerability that allows attackers to circumvent Secure Boot protections on affected systems. This could enable loading of unauthorized or malicious code during the boot process. The vulnerability affects systems with Secure Boot enabled, primarily Windows devices.

💻 Affected Systems

Products:
  • Microsoft Windows Secure Boot
Versions: Multiple Windows versions with Secure Boot enabled
Operating Systems: Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, Windows Server 2022
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with UEFI Secure Boot enabled. Legacy BIOS systems are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete Secure Boot bypass allowing persistent malware installation at boot level, enabling rootkit deployment and system compromise that survives OS reinstallation.

🟠

Likely Case

Attackers bypass Secure Boot to load malicious drivers or boot components, potentially leading to credential theft, data exfiltration, or ransomware deployment.

🟢

If Mitigated

With proper controls, impact is limited to systems where attackers have physical access or administrative privileges to modify boot configuration.

🌐 Internet-Facing: LOW - Requires local access or administrative privileges to exploit, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Internal attackers with administrative access could exploit to establish persistence or bypass security controls.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires administrative privileges or physical access to modify boot configuration. No public exploit code available as of current knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: March 2024 security updates (KB5035853 for Windows 11, KB5035855 for Windows 10, etc.)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26184

Restart Required: Yes

Instructions:

1. Apply March 2024 Windows security updates via Windows Update. 2. For enterprise: Deploy through WSUS or Microsoft Endpoint Configuration Manager. 3. Verify Secure Boot remains enabled after update. 4. Reboot system to complete installation.

🔧 Temporary Workarounds

Disable Secure Boot (NOT RECOMMENDED)

all

Disabling Secure Boot eliminates the vulnerability but removes important security protection

Access UEFI/BIOS settings during boot
Navigate to Security or Boot options
Disable Secure Boot feature

🧯 If You Can't Patch

  • Implement strict physical security controls to prevent unauthorized access to systems
  • Enforce principle of least privilege and monitor for unauthorized boot configuration changes

🔍 How to Verify

Check if Vulnerable:

Check if March 2024 security updates are installed via 'systeminfo' command or Windows Update history

Check Version:

wmic os get caption,version,buildnumber

Verify Fix Applied:

Verify Secure Boot is enabled and functioning: Run 'Confirm-SecureBootUEFI' in PowerShell (returns True if enabled)

📡 Detection & Monitoring

Log Indicators:

  • Unexpected Secure Boot policy changes in System logs
  • Boot configuration modifications in Event Viewer
  • Failed Secure Boot validations

Network Indicators:

  • Unusual outbound connections during boot process
  • Network traffic from boot-level components

SIEM Query:

EventID=12 OR EventID=13 OR EventID=4672 with process containing 'boot' or 'secureboot'

🔗 References

📤 Share & Export