Microsoft has blocked Secure Boot mitigations for the BlackLotus (CVE-2023-24932) vulnerability on some PCs. The block affects Windows Server 2012 and 2012 R2 systems due to incompatibilities with TPM
Secure boot vulnerability RSS
Microsoft has addressed a security vulnerability that can lead to BitLocker Secure Boot bypass on both Windows 10 and 11. Alongside that, the company has also detailed how to resize the WinRE space.
The source code for BlackLotus vulnerability leaked a few days ago, almost around the same time as Microsoft rolled out the second phase hardening of its secure boot flaw via Dynamic Windows updates.
Microsoft recently began patching UEFI bootkit vulnerabilities with this month's Patch Tuesday update. The company has now released a helpful guide about blocking such Windows boot managers.
Microsoft has patched UEFI Secure Boot security vulnerability called BlackLotus with its latest Update Tuesday released earlier today. The fix is available on Windows 10, Windows 11, and Servers.
Microsoft has published some helpful guidance against the BlackLotus UEFI bootkit vulnerability that can bypass Secure Boot, VBS, BitLocker, Windows Defender, and more to infect updated Windows PCs.
BlackLotus, which is a bootkit, has been doing the rounds on the internet since last year. This bootkit is capable of bypassing Secure Boot, disabling BitLocker, Microsoft Defender, and more.
Microsoft is starting to push the KB5012170 security update on Windows 11 22H2. The update supposed to patch a Secure Boot DBX GRUB vulnerability, though, has a lot of known issues.
ESET has discovered another set of security vulnerabilities on Windows 11 and 10 Lenovo laptops. These allow attackers to disable Secure Boot. A list of vulnerable device models has been published.
With Patch Tuesday recently, Microsoft released the KB5012170 update which adds new vulnerable UEFI signatures to the Secure Boot DBX. The newly added signatures are related to the GRUB vulnerability.
A newly discovered flaw in Secure Boot affects almost all Linux distros and Windows devices that leverage the UEFI boot tech. If the flow is exploited, attackers can gain full control of the system.