
Windows users who do not always install an update rolled out by Microsoft every month for patch Tuesday, would like to install for June. This is because the latest round of the patch fixes a defect that can allow an attacker to control your PC through bootcuit malware.
Specified Cve-2025-3052According to binrally security researcher Alex Matrosov, the safe boot bypass defect is a serious, who discovered vulnerability. One in Binarly blog post Published on Tuesday, he described the problem as an issue of a memory corruption that exploits Microsoft’s safe boot.
Too: Massive data breech for Google, Microsoft, Facebook, and more exposes 184 million passwords
“The attackers can take advantage of this vulnerability to run the non -rated code during the boot process, effectively bypass safe boot and compromise on the system of systems of the system.” “Because the attacker’s code is executed even before the operating system is loaded, it opens the door to install a bootkit for the attackers and reduce the OS-level security rescue.”
Clever and dangerous malware
The bootkit malware is particularly clever and dangerous. By running before your PC boots, it is able to skirt your general safety and before detecting out. In addition, such malware may allow attackers to control your PC, infect with additional malware, or even reach your confidential information.
The irony here is that Microsoft specifically applied a safe boot on Windows PC to prevent malware from loading malware during the boot-up process. This safety feature is available on PCs which uses Unified Extensible Firmware Interface (UEFI) firmware as more modern replacement for old BIOS firmware.
Too: Apple, Google, and Microsoft offer free password managers – but should you use them?
In this case, however, the defect allows an attacker to bypass safe boots by signing a weak UEFI application with a third -party certificate of Microsoft, essentially blanch carts to run it. Although the defect has not been exploited in the wild, the weak application is around 2022, and was uploaded Virustotal security siteThe place where Metrosov discovered it.
How to protect your PC
Fortunately, Microsoft has patch the defect. In Windows 10 or 11, go to Settings, select Windows updates, and then download the latest update. After rebooting, your PC will be protected.
Too: You can try the newest menu of Windows 11 – how is here
The June patch on Tuesday rollout cures several other weaknesses, rated as important with total 66, nine. A second safe boot defect is identified Cve-2025-4275While the other is a zero-day vulnerability which is listed Cve-2025-33053,
Get top stories of morning with us in your inbox every day Tech Today Newsletter.