CVE-2024-37987

8.0 HIGH

📋 TL;DR

This Secure Boot vulnerability allows attackers to bypass security features and execute unauthorized code during the boot process. It affects systems with Secure Boot enabled, primarily impacting Windows devices and potentially other platforms using affected firmware.

💻 Affected Systems

Products:
  • Windows 10
  • Windows 11
  • Windows Server 2016
  • Windows Server 2019
  • Windows Server 2022
Versions: All versions prior to July 2024 security updates
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Secure Boot to be enabled and attacker to have administrative privileges or physical access to modify boot configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with persistent malware that survives OS reinstallation, enabling data theft, ransomware deployment, or system destruction.

🟠

Likely Case

Malicious code execution with elevated privileges, allowing attackers to disable security controls, install backdoors, or deploy additional payloads.

🟢

If Mitigated

Limited impact if Secure Boot is disabled or if attackers lack physical/administrative access to modify boot configuration.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires administrative privileges or physical access to the system. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: July 2024 security updates (KB5040442 for Windows 11, KB5040434 for Windows 10, etc.)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37987

Restart Required: Yes

Instructions:

1. Apply July 2024 Windows security updates via Windows Update. 2. For enterprise environments, deploy updates through WSUS or Microsoft Endpoint Configuration Manager. 3. Restart systems after update installation.

🔧 Temporary Workarounds

Disable Secure Boot

all

Temporarily disables Secure Boot feature to prevent exploitation, but reduces system security against other boot-level attacks.

Access UEFI/BIOS settings during boot and disable Secure Boot option

🧯 If You Can't Patch

  • Restrict physical access to systems and implement strict administrative privilege controls.
  • Monitor for unauthorized boot configuration changes and implement device control policies.

🔍 How to Verify

Check if Vulnerable:

Check if July 2024 security updates are installed via Settings > Windows Update > Update history or run 'systeminfo' command.

Check Version:

wmic qfe list | findstr KB5040442 or wmic qfe list | findstr KB5040434

Verify Fix Applied:

Verify KB5040442 (Windows 11) or KB5040434 (Windows 10) is installed and Secure Boot is enabled in UEFI settings.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected Secure Boot policy changes in System logs
  • Boot configuration modifications in Event Viewer

Network Indicators:

  • Unusual outbound connections during boot process

SIEM Query:

EventID=12 OR EventID=13 AND Source='Microsoft-Windows-Kernel-Boot' AND Description contains 'Secure Boot'

🔗 References

📤 Share & Export