CVE-2024-37984
📋 TL;DR
This vulnerability allows attackers to bypass Secure Boot protections on affected systems, potentially enabling them to load and execute unauthorized code during the boot process. It affects systems with specific hardware configurations and firmware implementations. Organizations using vulnerable hardware platforms are at risk.
💻 Affected Systems
- Specific hardware platforms with vulnerable UEFI/BIOS implementations
📦 What is this software?
Windows 10 1507 by Microsoft
Windows 10 1607 by Microsoft
Windows 10 1809 by Microsoft
Windows 10 21h2 by Microsoft
Windows 10 22h2 by Microsoft
Windows 11 21h2 by Microsoft
Windows 11 22h2 by Microsoft
Windows 11 23h2 by Microsoft
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with persistent malware that survives reboots and reinstallation, enabling data theft, ransomware deployment, or system destruction.
Likely Case
Targeted attacks against high-value systems to establish persistent footholds for espionage or data exfiltration.
If Mitigated
Limited impact due to physical access requirements and other security controls in place.
🎯 Exploit Status
Exploitation requires physical access or administrative privileges to modify boot settings.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Varies by hardware vendor - check vendor-specific firmware updates
Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37984
Restart Required: Yes
Instructions:
1. Identify affected hardware models from vendor advisories
2. Download latest firmware/UEFI updates from hardware vendor
3. Apply firmware updates following vendor instructions
4. Verify Secure Boot is enabled and functioning correctly
🔧 Temporary Workarounds
Enable Secure Boot with strict enforcement
allEnsure Secure Boot is enabled with the most restrictive policy available
Implement physical security controls
allRestrict physical access to vulnerable systems
🧯 If You Can't Patch
- Isolate vulnerable systems from critical networks
- Implement strict access controls and monitoring for administrative accounts
🔍 How to Verify
Check if Vulnerable:
Check hardware vendor security advisories for affected models and firmware versions
Check Version:
Windows: msinfo32 | Linux: dmidecode -t bios
Verify Fix Applied:
Verify firmware version is updated and Secure Boot status shows as active and validated
📡 Detection & Monitoring
Log Indicators:
- UEFI/BIOS update events
- Secure Boot policy changes
- Boot loader modification attempts
Network Indicators:
- Unusual outbound connections during boot process
SIEM Query:
EventID=12 OR EventID=13 (Windows Boot Configuration events) OR UEFI firmware update events