• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
researchers uncover uefi secure boot bypass in 3 microsoft signed

Researchers Uncover UEFI Secure Boot Bypass in 3 Microsoft Signed Boot Loaders

You are here: Home / General Cyber Security News / Researchers Uncover UEFI Secure Boot Bypass in 3 Microsoft Signed Boot Loaders
August 12, 2022

A security feature bypass vulnerability has been uncovered in 3 signed third-party Unified Extensible Firmware Interface (UEFI) boot loaders that let bypass of the UEFI Secure Boot attribute.

“These vulnerabilities can be exploited by mounting the EFI System Partition and replacing the current bootloader with the susceptible a person, or modifying a UEFI variable to load the vulnerable loader rather of the existing one,” hardware security company Eclypsium mentioned in a report shared with The Hacker News.

CyberSecurity

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The pursuing vendor-particular boot loaders, which have been signed and authenticated by Microsoft, have been identified vulnerable to the bypass and have been patched as aspect of the tech giant’s Patch Tuesday update produced this 7 days –

  • Eurosoft Boot Loader (CVE-2022-34301)
  • New Horizon Facts Devices Inc Boot Loader (CVE-2022-34302), and
  • Crypto Pro Boot Loader (CVE-20220-34303)

Safe Boot is a security regular built to thwart destructive systems from loading when a laptop or computer begins up (boots) and be certain only the program that is trusted by the Unique Machines Company (OEM) is introduced.

Boot Loaders

In other phrases, prosperous exploitation of the flaws could permit an adversary to circumvent security guardrails at startup and execute arbitrary unsigned code in the course of the boot process.

This can have even further knock-on effects, enabling a bad actor to gain entrenched access and set up persistence on a host by in a way that can survive functioning technique reinstalls and difficult push replacements, not to point out entirely bypassing detection by security application.

CyberSecurity

Contacting CVE-2022-34302 “significantly additional stealthy,” Eclypsium famous the New Horizon Datasys vulnerability is not only trivial to exploit in the wild, but can also “enable even much more advanced evasions these types of as disabling security handlers.”

Security handlers, for occasion, can incorporate Dependable Platform Module (TPM) measurements and signature checks, Eclypsium researchers Mickey Shkatov and Jesse Michael explained.

It is worthy of noting that exploiting these vulnerabilities necessitates an attacker to have administrator privileges, although getting community privilege escalation is not insurmountable.

“Significantly like BootHole, these vulnerabilities emphasize the issues of ensuring the boot integrity of equipment that depend on a intricate provide chain of sellers and code working with each other,” the researchers concluded, introducing “these issues emphasize how very simple vulnerabilities in third-party code can undermine the overall process.”

Found this posting fascinating? Stick to THN on Facebook, Twitter  and LinkedIn to examine additional exclusive articles we post.


Some components of this article are sourced from:
thehackernews.com

Previous Post: «feds: zeppelin ransomware resurfaces with new compromise, encryption tactics Feds: Zeppelin Ransomware Resurfaces with New Compromise, Encryption Tactics
Next Post: Chinese Hackers Backdoored MiMi Chat App to Target Windows, Linux, macOS Users chinese hackers backdoored mimi chat app to target windows, linux,»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections

Copyright © TheCyberSecurity.News, All Rights Reserved.