Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

ADV200011

Опубликовано: 13 июл. 2021
Источник: msrc

Описание

Microsoft Guidance for Addressing Security Feature Bypass in GRUB

Executive Summary

Microsoft is aware of a vulnerability in the GRand Unified Boot Loader (GRUB), commonly used by Linux. This vulnerability, known as “There’s a Hole in the Boot”, could allow for Secure Boot bypass.

To exploit this vulnerability, an attacker would need to have administrative privileges or physical access on a system where Secure Boot is configured to trust the Microsoft Unified Extensible Firmware Interface (UEFI) Certificate Authority (CA). The attacker could install an affected GRUB and run arbitrary boot code on the target device. After successfully exploiting this vulnerability, the attacker could disable further code integrity checks thereby allowing arbitrary executables and drivers to be loaded onto the target device.

Microsoft is working to complete validation and compatibility testing of a required Windows Update that addresses this vulnerability. If you are an IT professional and would like to immediately address this vulnerability, please see the mitigation option on installing an un-tested update. When the Windows updates become available, customers will be notified via revision to this advisory. If you wish to be notified when these updates are released, we recommend that you register for the security notifications mailer to be alerted of content changes to this advisory. See Microsoft Technical Security Notifications and Coming Soon: New Security Update Guide Notification System.

This vulnerability is detectable via TPM attestation and Defender ATP.

CVEs released for this issue: CVE-2020-10713, CVE-2020-14308, CVE-2020-14309, CVE-2020-14310, CVE-2020-14311, CVE-2020-15705, CVE-2020-15706, CVE-2020-15707.

Update: March 2, 2021

A new set of similar vulnerabilities has been discovered, documented under: CVE-2020-14372, CVE-2020-25632, CVE-2020-25647, CVE-2020-27749, CVE-2020-27779, CVE-2021-3418, CVE-2021-20225, CVE-2021-20233.

Update: August 9, 2022

Microsoft has released standalone security update 5012170 to provide protection against the vulnerabilities described in this advisory. See the FAQ section and KB5012170: Security update for Secure Boot DBX: August 9, 2022 for more information about this update.

Background Information

In 2012, Microsoft introduced the Secure Boot feature into the then-new, UEFI-based PC ecosystem.  UEFI Secure Boot is an anti-rootkit feature that defends the boot process from untrusted code execution.  As part of enabling this feature, Microsoft signs boot code both for Windows and 3rd-parties including Linux distributions. This boot code allows Linux systems to take advantage of Secure Boot.

The GRUB vulnerability provides a way to bypass the UEFI Secure Boot security feature for any system that trusts the Microsoft 3rd-party UEFI signer, which includes many PCs.

Mitigations

See the Mitigations section following the Exploitability section.

Recommended Actions

Microsoft recommends that enterprise customers review this advisory in detail and register for the security notifications mailer to be alerted of content changes to this advisory. See Microsoft Technical Security Notifications.

References

CVEs published March 2, 2021:

Меры по смягчению последствий

Microsoft has identified the following mitigations. Please be advised that these mitigations are not compatible with all software on all devices, so please ensure that your system is compatible before taking any action.

Reconfigure Secure Boot

  • Microsoft Surface provides the capability to configure Secure Boot with or without trust in 3rd-party UEFI CA.  Surface customers who do not require the 3rd-party UEFI CA can configure Secure Boot as 'Microsoft only' as a mitigation to this issue. For more information see Manage Surface UEFI settings.

WARNING Modification of UEFI Secure Boot configuration can trigger BitLocker Recovery and failures in other security software. Be sure to suspend BitLocker and have your BitLocker Recovery Key available if you are performing this operation.

  • Other OEMs may provide a similar reconfiguration option. Contact your OEM for more information.

Manually install untested DBX update

Working with the Linux community, Microsoft has released an untested update to address this vulnerability. This optional DBX update has received limited testing and is intended for IT professionals and enthusiasts. The update is hosted by the UEFI Forum at: https://uefi.org/revocationlistfile.

Important Please note that the currently available DBX update applies to the CVEs originally released for this issue on July 29, 2020, and to the additional CVEs released on March 2, 2021. We recommend that you register for the security notifications mailer to be alerted of content changes to this advisory. See Microsoft Technical Security Notifications.

Please see the References section of this advisory for guidance on installing this update.

WARNING Installation of this patch on incompatible systems could result in runtime error, system hang, or even unrecoverable failure to boot. Please check with your OEM to determine if your equipment is compatible.

FAQ

Is BitLocker affected by this vulnerability?

No. BitLocker is not affected.

Are Hyper-V guests configured for Secure Boot of Windows vulnerable?

No. Hyper-V guests configured for Secure Boot of Windows are not vulnerable.

How do I know my system might be affected by this vulnerability?

Run the following command in an administrative PowerShell session:

[System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI db).bytes) -match 'Microsoft Corporation UEFI CA 2011'

If the PowerShell command returns “True”, then your system firmware trusts the 'Microsoft Corporation UEFI CA 2011' signing Certificate Authority that is used to sign third-party boot managers and will allow the known vulnerable third-party boot managers to be installed and run on your system system if the latest DBXUpdate is not installed to firmware. If the PowerShell command returns “False”, then the third-party boot managers will not be trusted by your system.

For more detailed instructions on verifying and manually applying updates, see Microsoft guidance for applying Secure Boot DBX update.

Note that it is not necessary to verify that your system firmware trusts the 'Microsoft Corporation UEFI CA 2011' signing Certificate Authority. You can automatically install the latest update if they are applicable to your system. See KB5012170: Security update for Secure Boot DBX - Microsoft Support for more details.

What is UEFI?

UEFI (Unified Extensible Firmware Interface) defines the interactions between the operating system and the platform firmware. The Secure Boot feature of UEFI prevents the loading of operating system loaders and firmware drivers that are not signed by a trusted signature.

What is GRUB?

GRUB (GRand Unified Bootloader) is the default boot loader for multiple Linux Distributions. It loads the selected kernel or operating system upon boot.

What is DBX?

DBX is the Forbidden Signature Database and tracks the revoked boot images.

Does this vulnerability only affect Linux?

No. The vulnerability affects any computer where Secure Boot trusts the 3rd-party UEFI CA.

You have indicated that an optional update is available. When will this update become mandatory?

Microsoft will release an update to address this vulnerability during mid-year 2022. You can register for the security notifications mailer to be alerted when this update is available, and when content changes are made to this advisory. See Microsoft Technical Security Notifications and Coming Soon: New Security Update Guide Notification System.

Why are there different security update packages for this CVE?

These are standalone security updates. These packages must be installed in addition to the normal security updates to be protected from this vulnerability.

Are there any prerequisites to these security updates?

These security updates have a Servicing Stack Update prerequisite for specific KB numbers. The packages have a built in pre-requisite logic to ensure the ordering.

Customer should ensure that they have the latest Servicing Stack Update installed before installing these standalone security updates. See ADV990001 | Latest Servicing Stack Updates for more information.

If I need to manually install these standalone updates, a Servicing Stack Update, and an August 2022 Security Update, in what order should they be installed?

Customers who need to manually install these three updates should install them in the following order:

  • Servicing Stack Update
  • Standalone Secure Boot Update listed in this CVE
  • August 2022 Security Update

Customers whose systems are configured to receive automatic updates will automatically receive these updates in the correct order.

Is there anything else that I should know about these updates?

If Windows Defender Credential Guard (Virtual Secure Mode) is enabled, two additional reboots will be required.

Обновления

ПродуктСтатьяОбновление
Windows Server 2012
Windows Server 2012 (Server Core installation)
Windows 8.1 for 32-bit systems
Windows 8.1 for x64-based systems
Windows Server 2012 R2
Windows RT 8.1
-
Windows Server 2012 R2 (Server Core installation)
Windows 10 for 32-bit Systems
Windows 10 for x64-based Systems
Windows Server 2016

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

DOS

N/A