CVE-2024-28920

7.8 HIGH

📋 TL;DR

CVE-2024-28920 is a Secure Boot security feature bypass vulnerability that allows attackers to bypass Secure Boot protections on affected systems. This could enable loading of untrusted or malicious code during the boot process. The vulnerability affects Windows systems with Secure Boot enabled.

💻 Affected Systems

Products:
  • Microsoft Windows
Versions: Multiple Windows versions - check Microsoft advisory for specifics
Operating Systems: Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, Windows Server 2022
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Secure Boot enabled. UEFI firmware must support Secure Boot.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of system integrity from boot, allowing persistent malware installation that survives OS reinstallation and disk formatting.

🟠

Likely Case

Attackers bypass Secure Boot to load bootkits or rootkits that evade detection and maintain persistence.

🟢

If Mitigated

Limited impact with proper patch management and Secure Boot enforcement, though physical access risks remain.

🌐 Internet-Facing: LOW - Requires physical access or administrative privileges on the target system.
🏢 Internal Only: MEDIUM - Insider threats or compromised administrative accounts could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires administrative privileges or physical access to the system. Secure Boot bypass vulnerabilities typically require sophisticated exploitation techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: April 2024 security updates - KB5036893 for Windows 11, KB5036892 for Windows 10, etc.

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28920

Restart Required: Yes

Instructions:

1. Apply April 2024 Windows security updates via Windows Update. 2. For enterprise: Deploy through WSUS, Configuration Manager, or Microsoft Intune. 3. Verify Secure Boot remains enabled after update. 4. Restart system to complete installation.

🔧 Temporary Workarounds

Enable Secure Boot Enforcement

windows

Ensure Secure Boot is properly configured and enforced in UEFI firmware settings

Restrict Physical Access

all

Implement physical security controls to prevent unauthorized access to systems

🧯 If You Can't Patch

  • Implement strict physical security controls and access monitoring
  • Use device control policies to prevent unauthorized boot media usage
  • Enable BitLocker with TPM protection to detect boot process tampering
  • Monitor for unexpected Secure Boot policy changes or boot failures

🔍 How to Verify

Check if Vulnerable:

Check if system has April 2024 security updates installed. Run: Confirm-SecureBootUEFI in PowerShell to verify Secure Boot status.

Check Version:

Run 'systeminfo' or 'winver' to check Windows version and update status

Verify Fix Applied:

Verify April 2024 security updates are installed via Windows Update history or 'winver' command. Confirm Secure Boot remains enabled.

📡 Detection & Monitoring

Log Indicators:

  • Secure Boot policy changes in System logs
  • Unexpected boot failures or recovery events
  • Changes to boot configuration data (BCD)

Network Indicators:

  • Unusual outbound connections during boot process (difficult to detect)

SIEM Query:

EventID=12 from source 'Microsoft-Windows-Kernel-Boot' with Secure Boot status changes OR EventID=1001 from source 'Microsoft-Windows-WER-SystemErrorReporting' for boot failures

🔗 References

📤 Share & Export