Applies ToWindows Server 2012 Windows Server 2012 R2 Windows 10 Windows 10 Education, version 1607 Windows 10 Professional version 1607 Windows 10 Enterprise, version 1607 Windows 10 Enterprise version 1607 Windows 10 Enterprise, version 1809 Windows 10 Professional Education version 1607 Windows 10 Pro Education, version 1607 Windows Server 2016 Windows Server 2019 Windows Server 2022 Windows 10 Home and Pro, version 21H2 Windows 10 Enterprise and Education, version 21H2 Windows 10 IoT Enterprise, version 21H2 Windows 10 Home and Pro, version 22H2 Windows 10 Enterprise Multi-Session, version 22H2 Windows 10 Enterprise and Education, version 22H2 Windows 10 IoT Enterprise, version 22H2 Windows 11 Home and Pro, version 21H2 Windows 11 Enterprise Multi-Session, version 21H2 Windows 11 Enterprise and Education, version 21H2 Windows 11 IoT Enterprise, version 21H2 Windows 11 Home and Pro, version 22H2 Windows 11 Enterprise Multi-Session, version 22H2 Windows 11 Enterprise and Education, version 22H2 Windows 11 IoT Enterprise, version 22H2 Azure Local, version 22H2 Windows 11 Home and Pro, version 23H2 Windows 11 Enterprise and Education, version 23H2 Windows 11 Enterprise Multi-Session, version 23H2 Windows 11 IoT Enterprise, version 23H2

Original publish date: February 13, 2025

KB ID: 5053946

Introduction

This document describes the deployment of the protections against the publicly disclosed Secure Boot security feature bypass that uses the BlackLotus UEFI bootkit tracked by CVE-2023-24932 for enterprise environments.

To avoid disruptions, Microsoft does not plan to deploy these mitigations in enterprises but is providing this guidance to help enterprises apply the mitigations themselves. This gives enterprises control over the deployment plan and timing of deployments.

Getting started

We have divided the deployment into multiple steps that can be achieved on a timeline that works for your organization. You should familiarize yourself with these steps. Once you have a good understanding of the steps, you should consider how they will work in your environment and prepare deployment plans that work for your enterprise on your timeline.

Adding the new Windows UEFI CA 2023 certificate and untrusting the Microsoft Windows Production PCA 2011 certificate requires cooperation from the device’s firmware. Since there is a large combination of device hardware and firmware, and Microsoft is unable to test all combinations, we encourage you to test representative devices in your environment before deploying broadly. We recommend that you test at least one device of each type that is used in your organization. Some known device issues that will block these mitigations are documented as part of KB5025885: How to manage the Windows boot manager revocations for Secure Boot changes associated with CVE-2023-24932. If you detect a device firmware issue not listed in the Known Issues section, work with your OEM vendor to address the issue.

Update to PCA2023 and the new boot manager

  • Mitigation 1: Install the updated certificate definitions to the DB Adds the new Windows UEFI CA 2023 certificate to the UEFI Secure Boot Signature Database (DB). By adding this certificate to the DB, the device firmware will trust Microsoft Windows boot applications signed by this certificate.

  • Mitigation 2: Update the boot manager on your device Applies the new Windows boot manager signed with the new Windows UEFI CA 2023 certificate.

These mitigations are important for the long-term serviceability of Windows on these devices. Because the Microsoft Windows Production PCA 2011 certificate in the firmware will expire in October 2026, devices must have the new Windows UEFI CA 2023 certificate in the firmware before expiration or the device will no longer be able to receive Windows updates, putting it in a vulnerable security state.

Update Bootable Media

After Mitigation 1 and Mitigation 2 are applied to your devices, you can update any bootable media that you use in your environment. Updating the bootable media means applying the PCA2023 signed boot manager to the media. This includes updating the network boot images (such as PxE and HTTP), ISO images, and USB drives. Otherwise, devices with the mitigations applied will not start from boot media that uses the older Windows boot manager and 2011 CA. ​​​​

Tools and guidance on how to update each type of bootable media are available here:

Media Type

Resource

ISO, USB drives, and so forth

KB5053484: Updating Windows bootable media to use the PCA2023 signed boot manager

PXE Boot Server

Documentation to be provided later

Untrust PCA2011 and apply Secure Version Number to DBX​​​​​​​

  • Mitigation 3: Enable the revocation Untrusts the Microsoft Windows Production PCA 2011 certificate by adding it to the firmwares Secure Boot DBX. This will cause the firmware to not trust all 2011 CA signed boot managers and any media that relies on the 2011 CA signed boot manager.

  • Mitigation 4: Apply the Secure Version Number​​​​​​​ update to the firmware Applies the Secure Version Number (SVN) update to the firmwares Secure Boot DBX. When a 2023-signed boot manager starts to run, it performs a self-check by comparing the SVN stored in the firmware with the SVN built into the boot manager. If the boot manager SVN is lower than the firmware SVN, the boot manager will not run. This feature prevents an attacker from rolling back the boot manager to an older, non-updated version. For future security updates to the boot manager, the SVN will be incremented, and Mitigation 4 will need to be reapplied.

References

CVE-2023-24932

KB5025885: How to manage the Windows boot manager revocations for Secure Boot changes associated with CVE-2023-24932

KB5016061: Secure Boot DB and DBX variable update events

KB5053484: Updating Windows bootable media to use the PCA2023 signed boot manager

Need more help?

Want more options?

Explore subscription benefits, browse training courses, learn how to secure your device, and more.