Description
Security researchers have disclosed a critical Secure Boot bypass vulnerability, tracked as CVE-2025-3052, that allows attackers to disable security protections on PCs and servers, enabling the installation of persistent bootkit malware. This flaw affects nearly all systems that trust Microsoft’s “UEFI CA 2011” certificate, which includes most modern hardware supporting Unified Extensible Firmware Interface (UEFI) Secure Boot. The vulnerability, discovered by Binarly researchers, exploits a legitimate BIOS update utility signed with Microsoft’s certificate, compromising the entire UEFI supply chain and allowing attackers to execute unsigned code during the boot process.
Attack Details
The vulnerability originates from a memory corruption flaw in a BIOS update utility signed with Microsoft’s UEFI CA 2011 certificate. This utility reads a user-writable NVRAM variable (IhisiParamBuffer) without proper validation, allowing attackers with administrative access to the operating system to manipulate this variable. By modifying the variable, attackers can write arbitrary data to memory lo- cations during the UEFI boot process, overwriting the gSecurity2 structure; a critical component enforcing Secure Boot checks. Setting the LoadImage function to zero disables Secure Boot, enabling the execution of unsigned UEFI modules, such as bootkits.
Bootkit malware is particularly dangerous as it runs before the operating system loads, evading traditional security software and persisting even after OS reinstallation. The vulnerable module, available online since at least late 2022, affects over 50 device manufacturers relying on Linux boot modules. Binarly’s proof-of-concept exploit demonstrated the ability to disable Secure Boot, highlighting the severity of the flaw. Microsoft addressed this issue in the June 2025 Patch Tuesday by blacklisting 14 cryptographic hashes tied to the affected firmware modules in the Secure Boot forbidden database (dbx).
Remediation
To protect systems from this Secure Boot bypass vulnerability, organizations and users should implement the following measures:
The Guyana National CIRT recommends that users and administrators review this alert and apply it where necessary.
PDF Download: New secure boot flaw enables bootkit malware installlation
References