CVE-2024-37984

8.4 HIGH

📋 TL;DR

This vulnerability allows attackers to bypass Secure Boot protections on affected systems, potentially enabling them to load and execute unauthorized code during the boot process. It affects systems with specific hardware configurations and firmware implementations. Organizations using vulnerable hardware platforms are at risk.

💻 Affected Systems

Products:
  • Specific hardware platforms with vulnerable UEFI/BIOS implementations
Versions: Vulnerable firmware versions vary by hardware vendor
Operating Systems: Windows, Linux, and other OSes that rely on Secure Boot
Default Config Vulnerable: ⚠️ Yes
Notes: Requires specific hardware/firmware combinations; not all systems are affected. Check with hardware vendors for specific models.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with persistent malware that survives reboots and reinstallation, enabling data theft, ransomware deployment, or system destruction.

🟠

Likely Case

Targeted attacks against high-value systems to establish persistent footholds for espionage or data exfiltration.

🟢

If Mitigated

Limited impact due to physical access requirements and other security controls in place.

🌐 Internet-Facing: LOW - Requires physical or administrative access to the system.
🏢 Internal Only: MEDIUM - Insider threats or compromised administrative accounts could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires physical access or administrative privileges to modify boot settings.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Varies by hardware vendor - check vendor-specific firmware updates

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37984

Restart Required: Yes

Instructions:

1. Identify affected hardware models from vendor advisories
2. Download latest firmware/UEFI updates from hardware vendor
3. Apply firmware updates following vendor instructions
4. Verify Secure Boot is enabled and functioning correctly

🔧 Temporary Workarounds

Enable Secure Boot with strict enforcement

all

Ensure Secure Boot is enabled with the most restrictive policy available

Implement physical security controls

all

Restrict physical access to vulnerable systems

🧯 If You Can't Patch

  • Isolate vulnerable systems from critical networks
  • Implement strict access controls and monitoring for administrative accounts

🔍 How to Verify

Check if Vulnerable:

Check hardware vendor security advisories for affected models and firmware versions

Check Version:

Windows: msinfo32 | Linux: dmidecode -t bios

Verify Fix Applied:

Verify firmware version is updated and Secure Boot status shows as active and validated

📡 Detection & Monitoring

Log Indicators:

  • UEFI/BIOS update events
  • Secure Boot policy changes
  • Boot loader modification attempts

Network Indicators:

  • Unusual outbound connections during boot process

SIEM Query:

EventID=12 OR EventID=13 (Windows Boot Configuration events) OR UEFI firmware update events

🔗 References

📤 Share & Export