CVE-2024-37978

8.0 HIGH

📋 TL;DR

This vulnerability allows attackers to bypass Secure Boot protections on affected systems, potentially enabling them to load and execute unauthorized code during the boot process. It affects systems with Secure Boot enabled, primarily Windows devices. Attackers with physical access or administrative privileges could exploit this to compromise system integrity.

💻 Affected Systems

Products:
  • Windows Secure Boot
Versions: Specific Windows versions as detailed in Microsoft advisory
Operating Systems: Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, Windows Server 2022
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Secure Boot enabled. UEFI firmware implementations may also be impacted.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with persistent malware that survives reboots and evades Secure Boot protections, enabling attackers to install rootkits or bootkits.

🟠

Likely Case

Local privilege escalation allowing attackers to bypass security controls and install malicious software that persists across reboots.

🟢

If Mitigated

Limited impact with proper physical security controls and administrative access restrictions in place.

🌐 Internet-Facing: LOW - Requires local access or administrative privileges to exploit, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Could be exploited by malicious insiders or attackers who gain local access to systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and administrative privileges. Exploitation involves manipulating boot process components.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Microsoft Security Update Guide for specific KB numbers

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37978

Restart Required: Yes

Instructions:

1. Apply latest Windows security updates from Microsoft. 2. Ensure UEFI/BIOS firmware is updated. 3. Restart system to complete installation.

🔧 Temporary Workarounds

Disable Secure Boot

all

Temporarily disable Secure Boot feature to prevent exploitation (not recommended for production)

Access UEFI/BIOS settings during boot and disable Secure Boot option

Restrict Physical Access

all

Implement strict physical security controls to prevent unauthorized local access

🧯 If You Can't Patch

  • Implement strict physical security controls and access monitoring
  • Restrict administrative privileges and implement least privilege access controls

🔍 How to Verify

Check if Vulnerable:

Check Windows Update history for applied security patches related to CVE-2024-37978

Check Version:

wmic os get caption, version, buildnumber, csdversion

Verify Fix Applied:

Verify Secure Boot is enabled and functioning properly in UEFI settings and Windows System Information

📡 Detection & Monitoring

Log Indicators:

  • Unexpected Secure Boot policy changes
  • Unauthorized bootloader modifications
  • Failed Secure Boot validations

Network Indicators:

  • Not network exploitable - focus on local system monitoring

SIEM Query:

EventID=12 OR EventID=13 from Microsoft-Windows-Kernel-Boot OR Secure Boot policy changes

🔗 References

📤 Share & Export