Discovered in the Wild: Two Secure Boot Vulnerabilities, but Microsoft is Only Patching One.

Researchers have recently discovered two publicly accessible exploits that effectively bypass the protections offered by Secure Boot, a widely adopted mechanism designed to ensure devices load only secure operating system images at startup. In response, Microsoft has initiated measures to mitigate one of these exploits while opting to leave the other as an ongoing risk.

In its latest monthly security update, Microsoft addressed CVE-2025-3052, a critical vulnerability in Secure Boot that impacts over 50 device manufacturers. Specifically, this flaw relates to more than a dozen modules that enable devices from these manufacturers to operate with Linux. An attacker with physical access can disable Secure Boot, allowing them to install malware that can execute before the operating system loads. These types of “evil maid” attacks are exactly what Secure Boot aims to prevent. Additionally, this vulnerability can be exploited remotely, potentially increasing the stealth and effectiveness of attacks if an adversary has previously obtained administrative rights on the affected machine.

At the heart of this vulnerability lies a significant issue in a tool utilized for flashing firmware images on motherboards produced by DT Research, a company known for its rugged mobile devices. This exploit has been available on VirusTotal for over a year and was digitally signed in 2022, indicating its accessibility through various channels prior to its recent discovery.

Although initially intended for DT Research devices, the affected module can run on most machines equipped with either Windows or Linux. This is due to the module’s authentication by the “Microsoft Corporation UEFI CA 2011” certificate, which is preinstalled on impacted devices. The primary function of this certificate is to validate shims that facilitate Linux loading, providing compatibility assurance for manufacturers. In response to the vulnerability, Microsoft’s recent patch includes cryptographic hashes for 14 versions of the DT Research tool in a block list stored in the DBX database, which contains revoked or untrusted signed modules.

Businesses should be keenly aware of the risks outlined by this vulnerability, especially given the implications that it brings to system security during the boot process. The exposure of Secure Boot through this exploit represents a significant point of potential failure, emphasizing the need for robust security measures.

Given the tactics likely employed in this attack, the MITRE ATT&CK framework suggests a potential application of initial access and privilege escalation methodologies. Attackers may utilize physical access or prior administrative control to facilitate their exploits, highlighting the importance of comprehensive security practices to mitigate such threats effectively.

As the cybersecurity landscape continues to evolve, business owners must remain vigilant, ensuring that their systems are updated and resilient against emerging vulnerabilities like those associated with Secure Boot, which could potentially undermine the foundational elements of device security.

Source