Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    This app immediately blocks sensitive information from your MAC screenshot.

    August 5, 2025

    Rainmware attacks: danger of developing US financial institutions

    August 5, 2025

    Link Rebound 4% as Chenlink Roll Out Data Stream for US Equity and ETF

    August 5, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»New safe boot defects install the attackers bootkit malware, patch now
    Security

    New safe boot defects install the attackers bootkit malware, patch now

    PineapplesUpdateBy PineapplesUpdateJune 11, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    New safe boot defects install the attackers bootkit malware, patch now
    Share
    Facebook Twitter LinkedIn Pinterest Email

    New safe boot defects install the attackers bootkit malware, patch now

    Security researchers have revealed a new safe boot bypass tracked as CVE-2025-3052 that can be used to close security on PCs and servers and install bootkit malware.

    This defect affects almost every system that rely on Microsoft’s “UEFI CA 2011” certificate, which is a lot of hardware that supports a safe boot.

    Binarly researcher Alex Matrosov discovered the CVE-2025-3052 defects after discovering Microsoft’s UEFI signing certificate.

    The utility was originally designed for rugged pills, but as it was signed with the UEFI certificate of Microsoft, it could run on any safe boot-capable system.

    Further investigation revealed that the weak module had been walking in the wild since at least 2022 and was later uploaded to Vishaltal in 2024, where it was seen by Binirli.

    Binarly revealed the blame for CERT/CC on 26 February 2025 Cve-2025-3052 Microsoft June 2025 Patch is being reduced today as part of Tuesday.

    However, during this process, Microsoft determined that the defect affected 13 other modules, which were added to the cancellation database.

    “During the triage process, Microsoft determined that the issue did not start only one module as it was believed to be initially, but really 14 diarrhea modules,” Binrali explains.

    “For this reason, the updated DBX released during the patch on Tuesday, June 10, 2025, includes 14 new hash.”

    Safe boot bypass

    This defect is caused by a valid BIOS update utility signed with Microsoft’s UEFI CA 2011 certificate, which is rely on most modern systems using UEFI firmware.

    Microsoft UEFI CA signed weak module with 2011 certificate
    Microsoft UEFI CA signed weak module with 2011 certificate
    Source: Binarly

    This utility reads a user-writing Nvram without validating the Ihisiparmbuffer. If an attacker has administrator rights for an operating system, they can modify this variable, so arbitrary data is written at memory locations during the UEFI boot process. This is done before the operating system, or even kernels, loaded.

    Using this vulnerability, Binarly exploited a proof-off-concept to zero the ‘GSECURITY2’ global variable, which is used to apply a safe boot.

    “For our proof of concept (POC), we choose to transmit the global variable GSECURITY2,” tell Binrally report,

    “This variable safety keeps an indicator for 2 architectural protocols, which the loadimage function uses to apply a safe boot. By setting it on zero, we disable safe boots safely, allowing any non -composed UEFI module to be executed.”

    Once disabled, the attackers can install bootkit malware that can hide from the operating system and close further security features.

    To fix the CVE-2025-3052, Microsoft has added the affected module hash to the safe boot DBX cancellation list. Binarly and Microsoft users urge them to immediately install the DBX file updated through today’s safety updates to protect their equipment.

    Even today, another safe boot bypass affecting UEFI-Sangat firmware based on Insyde H2O was revealed by Nicolaj Schleze. Shortcoming, Dubbed hydroph 0 bia And the CVE-2025-4275 was tracked, insyde was informed and patched 90 days after the disclosure.

    Binarly shared a video that shows how their POC can disable safe boots and cause a message to display before the operating system boots.

    https://www.youtube.com/watch?v=bx6tfpccxk


    Tines needle

    Patching meant complex scripts, long and endless fire drills. No more.

    In this new guide, the tines break down how it is leveling with modern organ automation. Patch fast, reduce overhead, and focus on strategic tasks – no complex script is required.

    attackers boot bootkit defects install Malware patch safe
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleRegular walking can prevent back pain according to scientists – why is it here
    Next Article Proxima Fusion Club of Well-Funded joins with € 130m series A with nuclear contenders
    PineapplesUpdate
    • Website

    Related Posts

    Security

    Rainmware attacks: danger of developing US financial institutions

    August 5, 2025
    Security

    Anthropic AI wants to stop the model from evil – how is here

    August 4, 2025
    Security

    Fashion giant channel hit salesforce data theft attacks

    August 4, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    This app immediately blocks sensitive information from your MAC screenshot.

    August 5, 2025

    Rainmware attacks: danger of developing US financial institutions

    August 5, 2025

    Link Rebound 4% as Chenlink Roll Out Data Stream for US Equity and ETF

    August 5, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2025 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.