Sign in with Microsoft
Sign in or create an account.
Hello,
Select a different account.
You have multiple accounts
Choose the account you want to sign in with.

IMPORTANT All customers should apply the July 11, 2023 Windows security updates. This article applies to customers who should take additional steps to implement security mitigations for a publicly disclosed Secure Boot bypass leveraged by the BlackLotus UEFI bootkit which requires physical or administrative access to the device.

CAUTION Once the mitigation for this issue is enabled on a device, meaning the revocations have been applied, it cannot be reverted if you continue to use Secure Boot on that device. Even reformatting of the disk will not remove the revocations if they have already been applied. Please be aware of all the possible implications and test thoroughly before applying the revocations that are outlined in this article to your device.

In this article

Summary

This article describes the protection against the publicly disclosed Secure Boot security feature bypass by using the BlackLotus UEFI bootkit tracked by CVE-2023-24932, how to enable the protections, and guidance to update bootable media. A bootkit is a malicious program that is designed to load as early as possible in a devices boot sequence to control the operating system start.

Secure Boot is recommended by Microsoft to make a safe and trusted path from the Unified Extensible Firmware Interface (UEFI) through the Windows kernels Trusted Boot sequence. Secure Boot helps prevent bootkit malware in the boot sequence. Disabling Secure Boot puts a device at risk of being infected by a bootkit malware. Fixing the Secure Boot bypass described in CVE-2023-24932 requires revoking boot managers. This could cause issues for some device’s boot configurations.

Protections for the Secure Boot bypass are included in the Windows security updates that were released on or after May 9, 2023—however, these protections are not enabled by default. The Windows security updates that were released on or after July 11, 2023 added simplified configuration options to manually enable the protections for the Secure Boot bypass. A second set of protections will be available in the first half of 2024. Enforcement of these protections will be six months after the second set of protections are released.

Before you enable these protections, you should review closely the details in this article and determine whether you need to enable the protections or wait for a future update from Microsoft. If you choose to enable the protections manually, you must verify your devices and all bootable media are updated and ready for this security hardening change. The second set of protections coming in the first half of 2024 will also require updates to offline media. Customers who use Microsoft cloud-based solutions should follow the guidance in Updating Bootable Media/Azure Cloud

Take Action 

Important Steps must be done in the following order and each step must be completed before moving to the next step. Bootable media will fail to start if all steps are not completed in order. If you previously completed these steps by using the Windows security update released on or after May 9, 2023, you do not need to repeat this procedure.

  1. INSTALL the Windows security update released on or after July 11, 2023 on all supported versions and then restart the device before enabling the revocations.

  2. UPDATE your bootable media with Windows security updates released on or after July 11, 2023. If you do not create your own media, you will need to get the updated official media from Microsoft or contact your device manufacturer (OEM).

  3. ENABLE revocations to protect against the vulnerability in CVE-2023-24932.

Scope of Impact

All Windows devices with Secure Boot protections enabled are affected by this issue, both on-premises physical devices and some virtual machines (VMs) or cloud-based devices. Protections are available for supported versions of Windows. For the full list, please see CVE-2023-24932.

Linux systems that rely on Secure Boot may also be affected by this issue. Microsoft has been coordinating with representatives from major Linux distributions to make the fix available for their operating systems. You must contact support for your Linux distribution for guidance on mitigating this issue for your Linux devices.

Cloud Services

Per the Shared Responsibility model, Microsoft is installing these Secure Boot updates for all software as a service (SaaS) and platform as a service (PaaS) by using Safe Deployment Practices. For Windows Infrastructure as a service (IaaS) based services which run on Azure with Secure Boot enabled (Trusted Launch VM or Confidential VM), you must follow the same steps for on-premises Windows devices.

Understanding the risk

For the BlackLotus UEFI bootkit exploit described in this article to be possible, an attacker must gain administrative privileges on a device or gain physical access to the device. This can be done by accessing the device physically or remotely, such as by using a hypervisor to access VMs/cloud. An attacker will commonly use this vulnerability to continue controlling a device that they can already access and possibly manipulate. Mitigations in this article are preventive and not corrective. If your device is already compromised, contact your security provider for help.

If you use Secure Boot and incorrectly perform the steps on this article, you might be unable to start or recover your device from media. This can prevent you from using recovery media, such as discs or external drives, or network boot recovery, if the media has not been correctly updated.

Avoiding issues with your Bootable Media

Because of the security changes that are required for CVE-2023-24932 and described in this article, revocations must be applied to supported Windows devices. After these revocations are applied, the devices will intentionally become unable to start by using recovery or installation media, unless this media has been updated with the security updates released on or after May 9, 2023. This includes both bootable media, such as discs, external drives, network boot recovery, and restore images. 

IMPORTANT You must update your bootable media by using the instructions in "Step 2: UPDATE" before enabling the revocations in "Step 3: ENABLE" in the "Deployment Guidelines" section.

Deployment guidelines

To deploy updates and apply revocations, follow these steps.

1.

INSTALL

Install the Windows monthly servicing updates released on or after July 11, 2023, on supported Windows devices. These updates include protections for CVE-2023-24932 but are not enabled by default. All Windows devices should complete this step whether or not you plan to enable the protections manually.

IMPORTANT Make sure to restart the device to complete the installation of the update before proceeding to Step 2 and Step 3.

NOTE SafeOS Dynamic Updates are now available to update WinRE partitions.

2.

UPDATE bootable media

Update any bootable media and full backups of Windows to make sure that it contains the updated files from the Windows updates released on or after July 11, 2023. See details in the Updating Bootable Media section. If you previously completed these steps by using the Windows security updates released on or after May 9, 2023, you do not need to repeat this procedure.

Updating the media with the Windows updates released on or after July 11, 2023 makes sure that the media will continue to start on all devices in your environment. Backups of Windows which were imaged before the installation of the Windows security updates will need to be recreated after installing these updates. These will not be directly usable to restore your Windows installation after the revocations have been enabled on your device.

If you need bootable media and you do not create your own media, you will need to get the updated official media from Microsoft, your cloud provider, or contact your device manufacturer (OEM). If it is unclear if the bootable media has been updated, you might need to test it on a Windows device on which updates released on or after July 11, 2023 have been installed and the revocations applied.

For detailed information and steps on updating bootable media, see the section “Updating Bootable Media” section.

3.

ENABLE the revocations

The revocation files are available as part of the updates released on or after July 11, 2023. These files include a “Code Integrity Boot Policy” and a “Secure Boot UEFI Forbidden List” update. Enabling these revocations files is necessary to be protected from the vulnerability described by CVE-2023-24932. The following steps, Step a through Step d, must be completed on all Windows devices to enable the revocations.

CAUTION After the revocations are enabled, bootable media that is not updated will no longer work as expected. Do not proceed with “Step 3: ENABLE” until you have updated your bootable media in "Step 2: UPDATE".

a. Enable the Secure Boot UEFI Forbidden List (DBX)  and the Code Integrity Boot Policy

The UEFI Forbidden List (DBX) is used to block untrusted UEFI modules from loading. The Code Integrity Boot Policy (SKUSiPolicy.p7b) uses the Code Integrity feature of Windows to prevent untrusted Windows boot managers from loading when Secure Boot is turned on.

After installing the Windows updates released on or after July 11, 2023, open a Command Prompt window running as an Administrator, type the following command and then press Enter:

reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Secureboot /v AvailableUpdates /t REG_DWORD /d 0x30 /f

b. Restart the device

After setting the registry key in Step a, you must restart the device to enable the revocation protections.

c. Wait at least 5 minutes and then restart the device again

IMPORTANT An additional restart is required to fully initialize the revocation protections.

d. Verify installation and revocation list was successfully applied

See Windows event log errors related to CVE-2023-24932 section for how to verify it was applied successfully.

Updating bootable media

Updating bootable media is important to make sure that the new boot manager and other supporting files are installed to allow for starting the device after the mitigations are applied. Ideally, the bootable media should be updated before applying the revocations on your device.

Important Do NOT enable the updated SKUSIPolicy.p7b file (containing the revocations) on your bootable media (ISO, USB, DVD, and so on). The SKUSIPolicy.p7b file from updates released on or after May 9, 2023 should only be enabled on your Windows devices.

Examples of bootable media and recovery media impacted by this issue

  • Bootable media created by using Create a recovery drive.

    NOTE The “Create a recovery drive” functionality is not supported in the updates released on or after May 9, 2023, and cannot be used to restore devices with revocation enabled. We are working on a resolution and will provide an update in an upcoming release.

  • Backups of Windows which were imaged before the installation of updates released on or after May 9, 2023. These will not be directly usable to restore your Windows installation after the revocations have been enabled on your device.

  • Custom CD/DVD or recovery partition created by you, your device manufacturer (OEM) or enterprises

  • ISO (through download or by using the ADK)

  • Network Boot

    • Windows Deployment Services

    • Preboot Execution Environment boot services (PXE boot services)

    • Microsoft Deployment Toolkit

    • HTTPS Boot

  • OEM installation and recovery media

  • Official Windows media from Microsoft including:

  • Windows PE

  • Windows installed on physical hardware or virtual machines

  • Windows Validation OS

NOTE Downloadable Windows media (ISO files) from Microsoft, updated with the latest Cumulative Updates, are available through familiar channels including Microsoft Software Download, Visual Studio Subscriptions, and the Volume Licensing Service Center. If this media works with your device and configuration, there is no need to follow the manual steps below to create updated bootable media.

If you use bootable media with a personal Windows device, you might need to do one or more of the following before applying revocations:

  • For all supported versions of Windows 10 and Windows 11, if the existing bootable media fails to start, see the "Create the installation media" section in Reinstall Windows.

  • If you use personal backup software to save the contents of your device, be sure to run a complete backup after installing the Windows update dated on or after July 11, 2023.

  • If you use a bootable disk image (ISO), a CD-ROM, or DVD media, update the media by following the instructions here.

Enterprise

  • See comprehensive guidelines and scripting for Update Windows installation media with Dynamic Update

  • If you support network boot or recovery scenarios in your environment, you will need to update all media and images with updates released on or after July 11, 2023. This can include the following boot or recovery options:

    • Microsoft Deployment Toolkit

    • Microsoft Endpoint Configuration Manager

    • Windows Deployment Services

    • PxE Boot

    • HTTPS boot and other network boot scenarios

  • One way to do this is by using DISM offline package installation on the images that are being served by these scenarios. This includes updating the boot files that are being offered by these services.

  • If you use backup software to save the contents of your Windows installation into a recovery image, be sure to run a complete backup after installing the Windows security updates released on or after May 9, 2023, including those released on or after July 11, 2023. Be sure to backup the EFI disk partition in addition to the Windows operating system partition. Clearly identify backups made before the May 9, 2023 updates versus those made after May 9, 2023 updates.

  • Media using Windows Preinstallation Environment (Windows PE) and Windows Recovery Environment (WinRE) based on Windows Server 2012, Windows 8.1, or Windows Server 2012 R2 will only need the boot manager files bootmgfw.efi and bootx64.efi or bootia32.efi (depending on the device architecture). Do not use this method of updating media for any other version of Windows.

Windows PC OEMs

Cloud Services

  • Microsoft will be installing these protections on Microsoft-managed cloud services, as necessary.

  • Enterprises using customer-managed cloud solutions should install these updates based on risk profile after thorough testing.

  • Hyper-V Generation 1 VMs and non-Secure Boot capable devices are not affected by the security issue in CVE-2023-24932 and the revocations do not apply to these devices.  You should still install updates released on or after July 11, 2023 on all supported versions of Windows.

  • Azure SaaS and PaaS Per the Shared Responsibility model, Microsoft is in the process of installing the updates addressing CVE-2023-24932 released in the July 11, 2023 updates for SaaS and PaaS Azure services. Microsoft deploys these updates using Safe Deployment Practices (SDP).

  • Azure laaS For IaaS based services, customers that need to mitigate this vulnerability can install the Windows updates released on or after July 11, 2023 and configure the revocation setting. Note that this fix and the associated configuration will provide protection for customers that have Secure Boot enabled. If customers need to protect against bootkit style attacks, they can enable Secure Boot. See Deploy a VM with trusted launch enabled for more details.

Timing of updates

Updates are released as follows:

  • Initial Deployment This phase started with updates released on May 9, 2023, and provided basic mitigations with manual steps to enable those mitigations.

  • Second Deployment This phase started with updates released on July 11, 2023, which added simplified steps to enable the mitigations for the issue.

  • Third Deployment This phase will add additional boot manager mitigations. This phase will start no sooner than January 9, 2024.

  • Enforcement The final enforcement phase that will make the mitigations permanent. This phase will start no sooner than July 9, 2024.

Note The release schedule for enforcement will be revised at a later date.

In this release, to mitigate CVE-2023-24932, the Windows Updates for May 9, 2023 include:

  • Updates for Windows released on or after May 9, 2023 to address vulnerabilities discussed in CVE-2023-24932.

  • Changes to Windows boot components.

  • Two revocation files which can be manually applied (a Code Integrity policy and an updated Secure Boot disallow list (DBX)).

Updates for Windows released on or after July 11, 2023 which adds the following:

  • Allow easier, automated deployment of the revocation files (Code Integrity Boot policy and Secure Boot disallow list (DBX)).

  • New Event Log events will be available to report whether revocation deployment was successful or not.

  • SafeOS Dynamic Update package for Window Recovery Environment (WinRE).

Updates for Windows released on or after January 9, 2024 will add the following:

  • New mitigations to block additional vulnerable boot managers. These new mitigations will require that media be updated.

When updates are released for the enforcement phase, they will add the following:

  • The revocations (Code Integrity Boot policy and Secure Boot disallow list) will be programmatically enforced after installing updates for Windows to all affected systems with no option to be disabled.

Windows Event log errors related to CVE-2023-24932

After the revocations in section 3 have been applied, the following two events should be observed in the event logs:

Event ID 1035

Event ID 1035 will be logged when the DBX update has been applied to the firmware successfully.

Event log

System

Event source

TPM-WMI

Event ID

1035

Level

Informational

Error message text

Secure Boot DBX update applied successfully

Event ID 276

Event ID 276 will be logged when the boot manager loads the SKUSIPolicy.p7b successfully.

Event log

Microsoft-Windows-Kernel-Boot/Operational

Event source

Kernel-Boot

Event ID

276

Level

Informational

Error message text

Windows boot manager revocation policy version 0x2000000000002 is applied.

Frequently Asked Questions (FAQ)

  • If the SKUSIPolicy.p7b file is removed from the EFI partition or the EFI partition is deleted or reformatted, WinRE looks for the SKUSIPolicy.p7b file and will not find it. This will cause WinRE to fail to start. Follow the guidance in the Troubleshooting Boot Issues section.

  • Update all Windows operating systems with updates released May 9, 2023 or later before applying the revocations. You might be unable to start any version of Windows that has not been updated to at least updates released May, 9 2023 after applying the revocations. Follow the guidance in the Troubleshooting Boot Issues section below.

  • You will need to Update the bootable media.

  • After updating all installed versions of Windows and updating your bootable media, the revocations can then be applied as described in the APPLY the revocations step.

Troubleshooting boot issues

The following errors might be displayed if the revocations have been applied and the boot manager is not from the Windows updates released on or after May 9, 2023.

Error image

Error text

For Windows 11 and most versions of Windows 10, you might receive this error if boot manager is not up to date.

Windows Boot Manager Windows 11 and Windows 10

Windows Boot Manager

A recent hardware or software change might have installed a file that is signed incorrectly or damaged, or that might be malicious software from an unknown source.

If you have a Windows installation disc, insert the disc and restart your computer. Click "Repair your computer", and then choose a recovery tool.

Otherwise, to start Windows so you can investigate further, press the ENTER key to display the boot menu, press FS for Advanced Boot Options, and select Last Known Good. If you understand why the digital signature cannot be verified and want to start Windows without this file, temporarily disable driver signature enforcement.

  • Status: 0xc0000428
    Info: The digital signature for this file couldn't be verified.

For Windows 10 Enterprise LTSB, you might receive this error if boot manager is not up to date.

Windows Boot Manager Windows 10 LTSB

Windows Boot Manager

Windows failed to start. A recent hardware or software change might be the cause. To fix the problem:

  1. Insert your Windows installation disc and restart your computer.

  2. Choose your language settings, and then click "Next.”

  3. Click "Repair your computer.”

If you do not have this disc, contact your system administrator or computer manufacturer for assistance.

Status: OxcOe90002
Info: An unexpected error has occurred.

Microsoft Hyper-V UEFI Denied

Microsoft Hyper-V UEFI 

Virtual Machine Boot Summary

  1. SCSI Disk (0,0)
    The image’s hash was denied (DBX).

  2. SCSI Disk (0,0)
    The image’s hash was denied (DBX).

  3. Network Adapter (00155D96B3C9)
    The boot loader failed.

No operating system was loaded. Your virtual machine may be configured incorrectly. Exit and re-configure your VM or click restart to retry the current boot sequence again.

To mitigate these errors, follow these steps:

  1. You have to temporarily disable Secure Boot. Follow the steps in Disable Secure Boot. If you are using a Surface device, you have to follow the steps in Open Surface UEFI menu.

  2. Start the device into Windows. If your system is configured to boot multiple versions of Windows, start the newest version of Windows.

  3. Install updates released May 9, 2023 or later, if they have not already been installed.

  4. Open a Command Prompt window running as Administrator, type each command separately, and then press Enter:

    mountvol q: /S

    xcopy %systemroot%\Boot\EFI\bootmgfw.efi q:\EFI\Microsoft\Boot

    xcopy %systemroot%\Boot\EFI\bootmgfw.efi q:\EFI\Boot\boot<arch>.efi

    xcopy %systemroot%\system32\SecureBootUpdates\SKUSiPolicy.p7b q:\EFI\Microsoft\Boot

    mountvol q: /D

    Where <arch> is x64, ia32, or aa64 , depending on the architecture of your device. You can determine this by typing the following command and then press Enter:

    dir q:\EFI\Microsoft\Boot*.efi

  5. Restart the device and follow the instructions in Re-enable Secure Boot.

Error image

Error text

You might receive the following error when Windows 10 or Windows 11 is started if the SKUSIPolicy.p7b file has been deleted after applying the revocations.

Recovery

Recovery

Your PC/Device needs to be repaired

An unexpected error has occurred.

Error code: 0xc0e90002

You'll need to use recovery tools. If you don't have any installation media (like a disc or USB device), contact your PC administrator or PC/Device manufacturer.

Microsoft Hyper-V UEFI

Microsoft Hyper-V UEFI

Virtual Machine Boot Summary

  1. SCSI Disk (0,0)
    The boot loader failed.

  2. SCSI Disk (0,0)
    The boot loader failed.

  3. Network Adapter (00155D96B3C9)
    The boot loader failed.

No operating system was loaded. Your virtual machine may be configured incorrectly.

 Exit and re-configure your VM or click restart to retry the current boot sequence again. 

To mitigate these errors, follow these steps:

  1. You need to temporarily disable Secure Boot. To do this, follow the steps in Disable Secure Boot. If you are using a Surface device, you will need to follow the steps in Open Surface UEFI menu.

  2. Start the device into Windows. If your system is configured to boot multiple versions of Windows, start the newest version of Windows.

  3. Install updates released on or after May 9, 2023, if they have not already been installed.

  4. Open a Command Prompt window running as Administrator, type each of the following commands separately, and then press Enter:

    mountvol q: /S

    xcopy %systemroot%\Boot\EFI\bootmgfw.efi q:\EFI\Microsoft\Boot

    xcopy %systemroot%\Boot\EFI\bootmgfw.efi q:\EFI\Boot\boot<arch>.efi

    xcopy %systemroot%\system32\SecureBootUpdates\SKUSiPolicy.p7b q:\EFI\Microsoft\Boot

    mountvol q: /D

    Where <arch> is x64, ia32, or aa64 depending on the architecture of your device. You can determine this by typing the following command and then press Enter:

    dir q:\EFI\Microsoft\Boot*.efi

  5. Restart the device and follow the instructions in Re-enable Secure Boot.

Error image

Error text

Windows Deployment Services/PxE Network Boot Error

Windows Deployment Services

Windows Deployment Serv ices (Server IP: nnn.nnn.nnn.nnn)

Windows Deployment Services encountered an error:

Error Code: 0xc0000272

To mitigate this error, follow this step:

References

Date of change

Description of change

May 15, 2023

  • Removed unsupported OS Windows 10, version 21H1 from "Applies to" section

May 11, 2023

  • Added a CAUTION note to Step 1 in the "Deployment guidelines" section about upgrading to Windows 11, version 21H2 or 22H2, or some versions of Windows 10.

May 10, 2023

  • Clarified that downloadable Windows media updated with the latest Cumulative Updates will soon be available

  • Corrected the spelling of the word "Forbidden"

May 9, 2023

  • Added additional supported versions to the "Applies to"section

  • Updated Step 1 of the "Take Action" section

  • Updated Step1 of the "Deployment guidelines" section

  • Corrected the commands in Step 3a of the "Deploment guidelines" section

  • Corrected placement of Hyper-V UEFI images in the "Troubleshooting boot issues" section

June 27, 2023

  • Removed note about updating from Windows 10 to a later version of Windows 10 which uses an enablement package under Step 1:Install in the "Deployment guidelines" section.

July 11, 2023

  • Updated the instances of the "May 9, 2023" date to "July 11, 2023," "May 9, 2023 and July 11, 2023," or to "May 9, 2023 or later."

  • In the "Deployment guidelines" section, we note that all SafeOS dynamic updates are now available for updating WinRE partitions. Additionally, the CAUTION box was removed because the issue is resolved by the release of the SafeOS dynamic updates.

  • In the "3. APPLY the revocations" section, the instructions have been revised.

  • In the "Windows Event log errors" section, Event ID 276 is added.

August 25, 2023

  • Updated various sections for wording and added the July 11, 2023 release and future 2024 release information.

  • Rearrangement of some content from the "Avoiding issues with your Bootable Media" section to the "Updating bootable media" section.

  • Updated the "Timing of updates" section with revised deployment dates and information.

Need more help?

Want more options?

Explore subscription benefits, browse training courses, learn how to secure your device, and more.

Communities help you ask and answer questions, give feedback, and hear from experts with rich knowledge.

Was this information helpful?

What affected your experience?

Thank you for your feedback!

×