Microsoft has unveiled stability updates to address a Safe Boot zero-day vulnerability exploited by BlackLotus UEFI malware to infect completely patched Windows techniques.
Protected Boot is a security feature that blocks bootloaders untrusted by the OEM on computer systems with Unified Extensible Firmware Interface (UEFI) firmware and a Reliable Platform Module (TPM) chip to protect against rootkits from loading in the course of the startup process.
In accordance to a Microsoft Protection Reaction Centre website put up, the stability flaw (tracked as CVE-2023-24932) was utilized to bypass patches released for CVE-2022-21894, a further Protected Boot bug abused in BlackLotus assaults past yr.
“To guard from this attack, a repair for the Windows boot supervisor (CVE-2023-24932) is included in the Might 9, 2023, stability update release, but disabled by default and will not deliver protections,” the enterprise claimed.
“This vulnerability lets an attacker to execute self-signed code at the