Header Ads

Microsoft Accidentally Leaks Backdoor Secret Keys to Bypass UEFI Secure Boot feature

Microsoft has accidentally leaked the Secret keys that allow hackers to unlock devices protected by UEFI (Unified Extensible Firmware Interface) Secure Boot feature.

Secure Boot is a security feature that protects your device from certain types of malware, such as a rootkit, which can hijack your system bootloader, as well as, Secure Boot restricts you from running any non-Microsoft operating system on your device.

In other words, when Secure Boot is enabled, you will only be able to boot Microsoft approved (cryptographically signature checking) operating systems. (Example Windows 8 or 10 you can't boot Win 7,Linux or You can boot Win 7 installer but  no drive boot  it will lags LOGO only )



To access this menu, open the Settings charm — either swipe in from the right and tap Settings or press Windows Key + I. Click the Power option under the Settings charm, press and hold the Shift key, and click Restart. Your computer will reboot into the boot options menu.
Note: if you are using Windows 10 you can get to the power options menu from the Start Menu. Just hold SHIFT and click Restart the same way.


To access the UEFI Firmware Settings, which are the closest thing available to the typical BIOS setup screen, click the Troubleshoot tile, select Advanced Options, and select UEFI Firmware Settings.

The Golden Keys disclosed by two security researchers, using alias MY123 and Slipstream, can be used to install non-Windows operating systems, say GNU/Linux or Android, on the devices protected by Secure Boot. 

According to the blog post published by researchers, it is impossible for Microsoft to fully revoke the leaked keys, potentially giving law enforcement (such as FBI and NSA) special backdoor that can be used to unlock Windows-powered devices in criminal cases.

This specific Secure Boot policy was created and signed by Microsoft for developers, testers, and programmers for debugging purposes.


"During the development of Windows 10 v1607 'Redstone,' MS added a new type of secure boot policy. Namely, "supplemental" policies that are located in the EFIESP partition…" researcher said.
"...a backdoor, which MS put into secure boot because they decided to not let the user turn it off in certain devices, allows for secure boot to be disabled everywhere!"

Yesterday, Microsoft released August Patch Tuesday that includes a security patch for designing flaw in Secure Boot for the second time in two months, but unfortunately, the patch is not complete.


Microsoft's August Patch Tuesday ( GMT+8 Wednesday) offers nine security bulletins with five rated critical, resolving 34 security vulnerabilities in Internet Explorer (IE), Edge, and Office, as well as some serious high-profile security issues with Windows.

This is actually I had yesterday on my Windows 10.. It include the  Microsoft PDF Remote Code Execution Vulnerability.


If you want to learn about all the August patch visit https://technet.microsoft.com/en-us/library/security/ms16-102.aspx



blogmytuts. Powered by Blogger.