{"id":167,"date":"2024-09-09T06:00:00","date_gmt":"2024-09-09T06:00:00","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=167"},"modified":"2024-09-09T06:00:00","modified_gmt":"2024-09-09T06:00:00","slug":"updating-secure-boot-is-crucial-to-keeping-systems-secure-and-working-properly","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=167","title":{"rendered":"Updating secure boot is crucial to keeping systems secure and working properly"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<p>New security features are great, but it\u2019s inevitable that bad actors will eventually find ways around even the most novel of protections. Keeping up with attackers may mean adjusting, changing, redeploying, or, in the case of secure boot, dealing with the update phases of deployment, evaluation, and ultimately enforcement.<\/p>\n<p>Starting on May 9, 2023, and more recently in the July 9, 2024 security releases, and documented in <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/kb5025885-how-to-manage-the-windows-boot-manager-revocations-for-secure-boot-changes-associated-with-cve-2023-24932-41a975df-beb2-40c1-99a3-b3ff139f832d\">KB5025885<\/a>, Microsoft has introduced protections against attacks used by the BlackLotus UEFI bootkit to bypass secure boot protections, features designed to prevent malicious software being loaded when a computer starts.<\/p>\n<p>Here are some actions that are crucial to ensuring the security and proper functioning of your systems.<\/p>\n<h2 class=\"wp-block-heading\">Identify the systems most at risk for secure boot attacks<\/h2>\n<p>For these attacks to be successful, malware needs physical or administrative access to the device. Merely installing updates is not enough to protect a system from attack. To fully protect machines on a network, you will need to deploy updated DBX deny list hashes.<\/p>\n<p>While not all machines need immediate attention, security products should be reviewed to determine whether they monitor for file and boot file changes. Even if there are systems in place that can monitor for such changes, machines that are more at risk or those with fewer monitoring resources should be updated first.<\/p>\n<p>Managing bootloaders can be troublesome \u2014 the idea behind the code is to ensure that only the operating system intended to boot on the machine will load. As the documentation notes, UEFI Secure Boot includes a <a href=\"https:\/\/tianocore-docs.github.io\/Understanding_UEFI_Secure_Boot_Chain\/draft\/secure_boot_chain_in_uefi\/uefi_secure_boot.html\">two part process<\/a>: verification of the boot image and verification of updates to the image security database.<\/p>\n<p>Bootloaders should have at least two certificates on the system which will control what software gets booted on the machine. Others may be added by the OEM manufacturer in order to control what loads. To dig into what certificates are available on your machines, consider installing a PowerShell module that will allow you to review the exact certificates on your machine.<\/p>\n<p>You can download this courtesy of <a href=\"https:\/\/oofhours.com\/2021\/01\/19\/uefi-secure-boot-who-controls-what-can-run\/\">Michael Niehaus<\/a> from the <a href=\"https:\/\/www.powershellgallery.com\/packages\/UEFIv2\/2.8\">PowerShell gallery<\/a>. Once installed you can then use the <strong>Get-UEFISecureBootCerts<\/strong> command to determine and inventory what is on each machine as you test your fleet.<\/p>\n<div class=\"extendedBlock-wrapper block-coreImage undefined\">\n<p class=\"imageCredit\">Susan Bradley<\/p>\n<\/div>\n<p>Managing these bootloaders isn\u2019t just about dealing with and protecting against ransomware attacks; bootloaders are dependent on certificates like many other technologies used in a secure manner, certificates that have start dates and, more importantly, end dates.<\/p>\n<p><a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/kb5036210-deploying-windows-uefi-ca-2023-certificate-to-secure-boot-allowed-signature-database-db-a68a3eae-292b-4224-9490-299e303b450b\">KB5036210<\/a> documents that since the February 13, 2024 Windows updates, you can apply a 2023 certificate to the UEFI Secure Boot Allowed Signature Database.<\/p>\n<p>As they note: \u201cUpdates to the DB are known to have compatibility issues with some devices. To ease the rollout to Windows devices, the update to the DB does not apply automatically. For enterprise environments, it is important to have a controlled rollout of the update after careful validation with representative devices present in the environment to avoid any disruption.\u201d<\/p>\n<h2 class=\"wp-block-heading\">A disruptive process<\/h2>\n<p>In order to trigger the rollout of the newer certificate, you can use a registry key or group policy to trigger the system to automatically update this certificate.<\/p>\n<p>First, enter a registry key to trigger the deployment of the new bootloader certificate found at the following location:<\/p>\n<p><strong>Registry path: HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSecureBoot<\/strong><\/p>\n<p><strong>Name: AvailableUpdates<\/strong><\/p>\n<p><strong>Value: 0x40<\/strong><\/p>\n<p>This deploys the new bootloader to your systems. You\u2019ll need to reboot systems twice in order to trigger the installation. Wait a few moments between each reboot.<\/p>\n<p>Ensure that you validate the installation. Use a PowerShell command to confirm:<\/p>\n<p><strong>[System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI db).bytes) -match \u2018Windows UEFI CA 2023\u2019<\/strong><\/p>\n<p>If the patch is staged properly, that value will say \u201cTrue.\u201d<\/p>\n<p>Now use another registry key to deploy the update to your system:<\/p>\n<p><strong>reg add HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSecureboot \/v AvailableUpdates \/t REG_DWORD \/d\u00a00x100 \/f<\/strong><\/p>\n<p>Once again, reboot your system twice.<\/p>\n<h2 class=\"wp-block-heading\">Some side effects of firmware updates have been noted<\/h2>\n<p>You can review the boot certificate on the system to be sure the process has completed properly. Ensure you review the type of hardware you have standardized with \u2014 some vendors have already identified side effects triggered by updating the firmware as noted in <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/kb5025885-how-to-manage-the-windows-boot-manager-revocations-for-secure-boot-changes-associated-with-cve-2023-24932-41a975df-beb2-40c1-99a3-b3ff139f832d#bkmk_known_issues\">KB5025885<\/a>.<\/p>\n<p>There has been some confusion over the impact of not taking action to update these bootloader files. The existing bootloader file has a certificate end date of 2026 and the concern revolves around whether this will detrimentally impact systems or if they will ignore this date and still boot.<\/p>\n<p>As the <a href=\"https:\/\/isc.sans.edu\/diary\/Even+Linux+users+should+take+a+look+at+this+Microsoft+KB+article\/31140\/?is=9dfd51174bb58c7d398a4aed49f766ef018e988d606ffc5d64332d2b523da939\">SANS incidents website<\/a> indicates: \u201cIf you fail to update, future firmware updates may fail. Some articles about this topic make it sound like your systems will fail to boot in Oct 2026. This is not the case. Firmware signatures using the old certificate authority will remain valid as long as they were issued before the certificate authority expired.\u201d The bottom line is that existing systems will boot properly.<\/p>\n<h2 class=\"wp-block-heading\">Networks using some Linux are also affected<\/h2>\n<p>If you are also using Linux in your environment, this also impacts you as well. You need to worry about both the issue with updating secure boot as well as considering that these devices too have certificates that will need to be updated. Reach out to your various vendors to determine what needs to be done going forward.<\/p>\n<p>If you are in a business setting, what\u2019s your best plan of action? Review your current deployment schedule. Many of you will \u201cdeploy\u201d your way to patched boot files rather than update them. It\u2019s recommended to set aside technical resources and have sample hardware to test on. Then test again. The hope is that a better plan of action will be had when Windows 11 24H2 is released. Currently there is too much testing and not enough definitive guidance on side effects and specific deployment guidance.<\/p>\n<p>You may need to identify hardware in your network that you will decide to pass on upgrading and instead replace, thus bypassing this issue, especially if you are in the process of replacing your Windows 10-based hardware with Windows 11. Review your hardware refresh goals accordingly.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>New security features are great, but it\u2019s inevitable that bad actors will eventually find ways around even the most novel of protections. Keeping up with attackers may mean adjusting, changing, redeploying, or, in the case of secure boot, dealing with the update phases of deployment, evaluation, and ultimately enforcement. Starting on May 9, 2023, and [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":168,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-167","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/167"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=167"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/167\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/168"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=167"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=167"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=167"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}