CVE-2024-26189

8.0 HIGH

📋 TL;DR

CVE-2024-26189 is a Secure Boot security feature bypass vulnerability that allows attackers to circumvent Secure Boot protections on affected systems. This could enable loading of untrusted or malicious code during the boot process. The vulnerability affects Windows systems with Secure Boot enabled.

💻 Affected Systems

Products:
  • Windows 10
  • Windows 11
  • Windows Server 2016
  • Windows Server 2019
  • Windows Server 2022
Versions: Multiple versions - see Microsoft advisory for specific affected builds
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Secure Boot enabled. UEFI firmware must support Secure Boot.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via bootkit or rootkit installation, allowing persistent malware that survives OS reinstallation and disk formatting.

🟠

Likely Case

Bypass of Secure Boot protections to load unauthorized drivers or boot components, potentially leading to credential theft, data exfiltration, or ransomware deployment.

🟢

If Mitigated

Limited impact if Secure Boot is disabled or systems are physically secured, though this reduces overall security posture.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires physical access or administrative privileges to modify boot configuration.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: March 2024 security updates (KB5035853 for Windows 11, KB5035849 for Windows 10, etc.)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26189

Restart Required: Yes

Instructions:

1. Apply March 2024 Windows security updates via Windows Update. 2. For enterprise environments, deploy updates through WSUS, SCCM, or Intune. 3. Verify Secure Boot remains enabled post-update.

🔧 Temporary Workarounds

Disable Secure Boot

windows

Temporarily disable Secure Boot in UEFI firmware settings to prevent exploitation, though this reduces security.

Enable BitLocker with TPM

windows

Enable BitLocker with TPM protection to add additional boot integrity checks.

manage-bde -on C: -usedpace -rp

🧯 If You Can't Patch

  • Restrict physical access to systems and implement strict administrative privilege controls.
  • Implement device control policies to prevent unauthorized boot media and monitor for boot configuration changes.

🔍 How to Verify

Check if Vulnerable:

Check if March 2024 security updates are installed via 'systeminfo' command or Windows Update history.

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify Secure Boot is enabled in msinfo32.exe and confirm March 2024 updates are installed.

📡 Detection & Monitoring

Log Indicators:

  • Event ID 1015 from Secure Boot in System logs
  • Unexpected changes to boot configuration in BCD store

Network Indicators:

  • Unusual outbound connections during boot process
  • DNS queries from boot components

SIEM Query:

EventID=1015 AND Source="Microsoft-Windows-SecureBoot" | where EventData contains "Validation failed"

🔗 References

📤 Share & Export