SB2024041061 - Multiple vulnerabilities in Microsoft Secure Boot
Published: April 10, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 24 secuirty vulnerabilities.
1) Improper access control (CVE-ID: CVE-2024-28922)
The vulnerability allows a local attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions in Secure Boot. An authenticated attacker with physical access can bypass Secure Boot.
2) Protection Mechanism Failure (CVE-ID: CVE-2024-20669)
The vulnerability allows a local user to bypass implemented security restrictions.
The vulnerability exists due to insufficient implementation of security measures in Secure Boot. A local administrator can bypass Secure Boot.
3) Time-of-check Time-of-use (TOCTOU) Race Condition (CVE-ID: CVE-2024-29062)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to a time-of-check, time-of-use (TOCTOU) race condition in Secure Boot. A remote attacker on the local network can cause a race condition and bypass Secure Boot.
4) Input validation error (CVE-ID: CVE-2024-26189)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to insufficient validation of user-supplied input in Secure Boot. A remote attacker on the local network can pass specially crafted input to the application and bypass Secure Boot.
5) Stack-based buffer overflow (CVE-ID: CVE-2024-28898)
The vulnerability allows a remote user to compromise the target system.
The vulnerability exists due to a boundary error in Secure Boot. A remote administrator on the local network can trigger stack-based buffer overflow and bypass Secure Boot.
6) Protection Mechanism Failure (CVE-ID: CVE-2024-28919)
The vulnerability allows a local user to bypass implemented security restrictions.
The vulnerability exists due to insufficient implementation of security measures in Secure Boot. A local administrator can bypass Secure Boot.
7) Stack-based buffer overflow (CVE-ID: CVE-2024-20688)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to a boundary error in Secure Boot. A remote unauthenticated attacker on the local network can trigger stack-based buffer overflow and bypass Secure Boot.
8) Protection Mechanism Failure (CVE-ID: CVE-2024-28921)
The vulnerability allows a local administrator can compromise the target system.
The vulnerability exists due to insufficient implementation of security measures in Secure Boot. A local administrator can bypass Secure Boot.
9) Protection Mechanism Failure (CVE-ID: CVE-2024-26250)
The vulnerability allows a local user to bypass implemented security restrictions.
The vulnerability exists due to insufficient implementation of security measures in Secure Boot. A local administrator can bypass Secure Boot.
10) Stack-based buffer overflow (CVE-ID: CVE-2024-28924)
The vulnerability allows a local user to compromise the target system.
The vulnerability exists due to a boundary error in Secure Boot. A local administrator can trigger stack-based buffer overflow and bypass Secure Boot.
11) Out-of-bounds read (CVE-ID: CVE-2024-26175)
The vulnerability allows a local user to compromise the target system.
The vulnerability exists due to a boundary condition in Secure Boot. A local user can trigger an out-of-bounds read error and bypass Secure Boot.
12) Integer overflow (CVE-ID: CVE-2024-26171)
The vulnerability allows a local user to compromise the target system.
The vulnerability exists due to integer overflow in Secure Boot. A local administrator can pass specially crafted data to the application, trigger integer overflow and bypass Secure Boot.
13) Heap-based buffer overflow (CVE-ID: CVE-2024-26168)
The vulnerability allows a local attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in Secure Boot. An attacker with physical access can pass specially crafted data to the application, trigger a heap-based buffer overflow and bypass Secure Boot.
14) Input validation error (CVE-ID: CVE-2024-28897)
The vulnerability allows a remote user to compromise the target system.
The vulnerability exists due to insufficient validation of user-supplied input in Secure Boot. A remote administrator on the local network can pass specially crafted input to the application and bypass Secure Boot
15) Protection Mechanism Failure (CVE-ID: CVE-2024-28903)
The vulnerability allows a local user to bypass implemented security restrictions.
The vulnerability exists due to insufficient implementation of security measures in Secure Boot. A local administrator can bypass Secure Boot.
16) Input validation error (CVE-ID: CVE-2024-26240)
The vulnerability allows a remote attacker to compromsie the target system.
The vulnerability exists due to insufficient validation of user-supplied input in Secure Boot. A remote attacker on the local network can pass specially crafted input to the application and bypass Secure Boot.
17) Stack-based buffer overflow (CVE-ID: CVE-2024-29061)
The vulnerability allows a local user to compromise the target system.
The vulnerability exists due to a boundary error in Secure Boot. A local user can trigger stack-based buffer overflow and bypass Secure Boot.
18) Protection Mechanism Failure (CVE-ID: CVE-2024-28920)
The vulnerability allows a local user to bypass implemented security restrictions.
The vulnerability exists due to insufficient implementation of security measures in Secure Boot. A local user can bypass Secure Boot.
19) Stack-based buffer overflow (CVE-ID: CVE-2024-20689)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to a boundary error in Secure Boot. A remote unauthenticated attacker on the local network can trigger stack-based buffer overflow and bypass Secure Boot.
20) Heap-based buffer overflow (CVE-ID: CVE-2024-28896)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to a boundary error in Secure Boot. A remote attacker on the local network can pass specially crafted data to the application, trigger a heap-based buffer overflow and bypass Secure Boot.
21) Stack-based buffer overflow (CVE-ID: CVE-2024-28925)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to a boundary error Secure Boot. A remote attacker on the local network can trigger stack-based buffer overflow and bypass Secure Boot.
22) Integer overflow (CVE-ID: CVE-2024-28923)
The vulnerability allows a local user to compromise the target system.
The vulnerability exists due to integer overflow in Secure Boot. A local adminisrator can pass specially crafted data to the application, trigger integer overflow and bypass Secure Boot.
23) Improper Verification of Cryptographic Signature (CVE-ID: CVE-2024-26194)
The vulnerability allows a local attacker to compromise the target system.
The vulnerability exists due to improper verification of cryptographic signature in Secure Boot. A local attacker can bypass Secure Boot.
24) Stack-based buffer overflow (CVE-ID: CVE-2024-26180)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to a boundary error in Secure Boot. A remote unauthenticated attacker on the local network can trigger stack-based buffer overflow and bypass Secure Boot.
Remediation
Install update from vendor's website.
References
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28922
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20669
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29062
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26189
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28898
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28919
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20688
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28921
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26250
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28924
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26175
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26171
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26168
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28897
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28903
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26240
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29061
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28920
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20689
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28896
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28925
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28923
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26194
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26180