CVE-2024-29061

7.8 HIGH

📋 TL;DR

CVE-2024-29061 is a Secure Boot security feature bypass vulnerability that allows attackers to bypass Secure Boot protections on affected systems. This affects Windows systems with Secure Boot enabled, potentially allowing unauthorized code execution during the boot process.

💻 Affected Systems

Products:
  • Windows 10
  • Windows 11
  • Windows Server 2016
  • Windows Server 2019
  • Windows Server 2022
Versions: Multiple versions - see Microsoft advisory for specific affected builds
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with UEFI Secure Boot enabled. Systems with legacy BIOS or Secure Boot disabled are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via bootkit installation, allowing persistent malware that survives OS reinstallation and disk formatting.

🟠

Likely Case

Bypass of Secure Boot protections enabling installation of boot-level malware or rootkits that evade standard security controls.

🟢

If Mitigated

Limited impact if Secure Boot is disabled or if additional boot integrity protections are in place.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires physical access or administrative privileges to modify boot configuration.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: April 2024 security updates - KB5036893 for Windows 11, KB5036892 for Windows 10, etc.

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29061

Restart Required: Yes

Instructions:

1. Apply April 2024 Windows security updates via Windows Update. 2. For enterprise: Deploy through WSUS or Microsoft Endpoint Configuration Manager. 3. Verify Secure Boot remains enabled post-update.

🔧 Temporary Workarounds

Disable Secure Boot

all

Temporarily disable Secure Boot in UEFI firmware settings to prevent exploitation

Enable BitLocker with TPM

windows

Enable BitLocker with TPM protection to add additional boot integrity verification

🧯 If You Can't Patch

  • Restrict physical access to vulnerable systems
  • Implement strict administrative access controls and monitor for unauthorized boot configuration changes

🔍 How to Verify

Check if Vulnerable:

Check if Secure Boot is enabled in UEFI firmware settings and verify Windows version is before April 2024 updates

Check Version:

wmic os get caption,version,buildnumber

Verify Fix Applied:

Verify Windows Update history shows April 2024 security updates installed and Secure Boot status shows as 'Enabled' in msinfo32

📡 Detection & Monitoring

Log Indicators:

  • Unexpected Secure Boot configuration changes in System logs
  • Boot configuration modifications in UEFI logs

Network Indicators:

  • Unusual network traffic patterns during boot process

SIEM Query:

EventID=12 OR EventID=13 | where Source='Microsoft-Windows-Kernel-Boot' | where Message contains 'Secure Boot'

🔗 References

📤 Share & Export