search menu icon-carat-right cmu-wordmark

CERT Coordination Center

A Vulnerability in UEFI Applications allows for secure boot bypass via misused NVRAM variable

Vulnerability Note VU#806555

Original Release Date: 2025-06-10 | Last Revised: 2025-06-16

Overview

UEFI firmware applications DTBios and BiosFlashShell from DTResearch contain a vulnerability that allows Secure Boot to be bypassed using a specially crafted NVRAM variable. The vulnerability stems from improper handling of a runtime NVRAM variable that enables an arbitrary write primitive, capable of modifying critical firmware structures, including the global Security2 Architectural Protocol used for Secure Boot verification.. Because the affected applications are signed by the Microsoft UEFI Certificate Authority, this vulnerability can be exploited on any UEFI-compliant system, allowing unsigned code to run during the boot process.

Description

Unified Extensible Firmware Interface (UEFI) defines a modern firmware architecture that facilitates interaction between a computer’s hardware and its operating system during early boot. When a UEFI-compliant system starts, UEFI applications and drivers are executed to initialize the system and hand off control to the operating system (OS) loader. These UEFI applications must be signed and verified for execution under Secure Boot. These signatures can originate from the OEM or from entries in the system’s signature database (DB), which commonly includes the Microsoft UEFI Certificate Authority (CA).

UEFI defines extensible NVRAM variables that store configuration, device customization, and runtime context shared across UEFI applications and the operating system. A vulnerability was identified in a Microsoft-signed UEFI application that uses the NVRAM variable IhisiParamBuffer as a pointer for memory operations, including overwriting the critical global security parameter gSecurity2 . This allows bypassing Security2 Architectural Protocol-based verification , enabling the execution of any unsigned UEFI binaries irresepective of UEFI Secure Boot settings.

In some implementations, IhisiParamBuffer is locked early during boot, preventing modification at runtime. However, as Binarly observed, the vulnerability can be exploited in environments where the IhisiParamBuffer NVRAM variable is not locked and remains writable at runtime. In such cases, attackers can bring and execute the vulnerable UEFI application even on systems with Secure Boot enabled—using a Bring Your Own Vulnerable Driver (BYOVD) approach. Initially the vulnerability was reported on DTResearch's Dtbios application version 71.22 for 64-bit architecture, however Microsoft has further identified that this vulnerability is present in both DtBios and BiosFlashShell on multiple versions. A total of 14 hashes have been added to the Forbidden Signature Database (DBX or Revocation List) to address these various binaries.

To mitigate this vulnerability, affected UEFI modules must be updated via vendor-provided software. Additionally, all UEFI-compliant system owners should update their Secure Boot Forbidden Signature Database (DBX or Revocation List), which is available via OEM updates, Microsoft, or the Linux Vendor Firmware Service (LVFS).

Impact

An attacker with the ability to modify the IhisiParamBuffer NVRAM variable can use it to perform arbitrary memory writes, enabling a Secure Boot bypass during early boot. This allows unsigned or malicious code to run before the OS loads, potentially installing persistent malware or kernel rootkits that survive reboots and OS reinstallations. Because this attack occurs before OS-level security tools initialize, it can evade detection by endpoint detection and response (EDR) systems. In some cases, it can even entirely disable EDR systems by modifying low-level interfaces before they load.

Solution

Apply a Patch

Multiple vendors have released software updates to address this vulnerability and prevent potential exploitation. Please refer to the Vendor Information section for applicable updates. Microsoft has also indicated they will release an updated DBX (Revocation List) file to prevent vulnerable components from being executed under Secure Boot. Windows Users can further use Check-UEFISecureBootVariables PowerShell scripts to verify whether the latest DBX updates can be applied. For Linux users, LVFS has released a blog article to detail revocation list updates through the Linux tools provided by the fwupd project.

Recommendations for Enterprises and Developers

Changes to the DBX (Forbidden Signature Database) may cause system boot failures if not carefully managed. Vendors should thoroughly test updates to ensure system stability. In some cases, it may be necessary to update the DB (Signature Database) before updating the DBX, as described in Microsoft’s KB5025885. Enterprises and cloud providers managing broad deployments of systems should prioritize these updates and confirm DBX revocation is enforced, particularly in virtualized environments, to block unauthorized UEFI binaries during early boot phases.

Acknowledgements

Thanks to Binarly REsearch team for the responsible disclosure of this vulnerability to CERT/CC. Thanks also to Microsoft and various vendors for their collaboration and timely response. This document was written by Vijay Sarvepalli.

Vendor Information

806555
 

DT Research Affected

Notified:  2025-03-31 Updated: 2025-06-10

Statement Date:   May 30, 2025

CVE-2025-3052 Affected

Vendor Statement

The signed tool (DTBIOS/BIOSFlashShell) is meant to be only used on DT Research's platforms with Insyde BIOS. As mentioned by Insyde, “Insyde has already fixed this bug sometime ago by locking the IhisiParamBuffer variable.” this tool will not be vulnerable on DT Research's platform. Furthermore, we agreed to revoke all Microsoft signed binary, to make sure this binary will not be executed on any other platforms from other vendors.

GIGABYTE Affected

Notified:  2025-05-09 Updated: 2025-06-13

Statement Date:   June 13, 2025

CVE-2025-3052 Affected

Vendor Statement

Gigabyte’s Clevo-based models use Insyde BIOS. Upon investigation, the issue has been identified as related to the MSFT DBX. It requires an update to the MSFT DBX key. A new BIOS version addressing this issue was released on June 11, 2025. All subsequent BIOS versions will include the updated DBX key, and the issue can be resolved by updating the BIOS.

LVFS Project Affected

Notified:  2025-02-26 Updated: 2025-06-10

Statement Date:   June 02, 2025

CVE-2025-3052 Affected

Vendor Statement

We have not received a statement from the vendor.

Microsoft Affected

Notified:  2025-02-26 Updated: 2025-06-10

Statement Date:   April 02, 2025

CVE-2025-3052 Affected

Vendor Statement

We have not received a statement from the vendor.

References

  • MSRC 95465

Red Hat Affected

Notified:  2025-02-26 Updated: 2025-06-10

Statement Date:   May 05, 2025

CVE-2025-3052 Affected

Vendor Statement

Red Hat does not directly ship any of the affected EFI applications. However, once the DBX update is made available, administrators will need to deploy the updated DBX on UEFI systems in order to prevent the vulnerable applications from being loaded.

References

American Megatrends Incorporated (AMI) Not Affected

Notified:  2025-02-26 Updated: 2025-06-10

Statement Date:   June 02, 2025

CVE-2025-3052 Not Affected

Vendor Statement

AMI does not directly distribute any of the affected EFI applications. However, once the DBX update is made available on https://github.com/microsoft/secureboot_objects, AMI will execute their standard DBX integration workflow which results in AMI releasing secure boot implementations with the latest DBX updates.

ASUSTeK Computer Inc. Not Affected

Notified:  2025-02-26 Updated: 2025-06-10

Statement Date:   April 25, 2025

CVE-2025-3052 Not Affected

Vendor Statement

Following a review with the internal development team, it has been confirmed that the vulnerability does not affect ASUS products.

Fsas Technologies Europe Not Affected

Notified:  2025-04-28 Updated: 2025-06-16

Statement Date:   June 16, 2025

CVE-2025-3052 Not Affected

Vendor Statement

We have not received a statement from the vendor.

Insyde Software Corporation Not Affected

Notified:  2025-02-26 Updated: 2025-06-10

Statement Date:   April 03, 2025

CVE-2025-3052 Not Affected

Vendor Statement

We have validated that our Kernels, version 5.4 - 5.7 are not affected. We tested by writing an application that attempts to directly write to the variable indicated (and a number of others) from under the OS. This does not preclude any chained vulnerabilities at this time. We are now working with our customers to validate their products as well.

Intel Not Affected

Notified:  2025-02-26 Updated: 2025-06-10

Statement Date:   March 04, 2025

CVE-2025-3052 Not Affected

Vendor Statement

We have not received a statement from the vendor.

UEFI Security Response Team Not Affected

Notified:  2025-02-26 Updated: 2025-06-10

Statement Date:   February 28, 2025

CVE-2025-3052 Not Affected

Vendor Statement

Since this potential vulnerability is not believed to be due to a UEFI specification issue, the UEFI Forum and its security response team is not affected. We will continue to monitor the issue and provide assistance where applicable.

Acer Unknown

Notified:  2025-02-26 Updated: 2025-06-10

CVE-2025-3052 Unknown

Vendor Statement

We have not received a statement from the vendor.

Dell Unknown

Notified:  2025-02-26 Updated: 2025-06-10

CVE-2025-3052 Unknown

Vendor Statement

We have not received a statement from the vendor.

Fujitsu Europe Unknown

Notified:  2025-02-26 Updated: 2025-06-10

CVE-2025-3052 Unknown

Vendor Statement

We have not received a statement from the vendor.

Fujitsu HQ Unknown

Notified:  2025-02-26 Updated: 2025-06-10

CVE-2025-3052 Unknown

Vendor Statement

We have not received a statement from the vendor.

Hewlett Packard Enterprise Unknown

Notified:  2025-02-26 Updated: 2025-06-10

CVE-2025-3052 Unknown

Vendor Statement

We have not received a statement from the vendor.

HP Inc. Unknown

Notified:  2025-02-26 Updated: 2025-06-10

CVE-2025-3052 Unknown

Vendor Statement

We have not received a statement from the vendor.

Lenovo Unknown

Notified:  2025-02-26 Updated: 2025-06-10

CVE-2025-3052 Unknown

Vendor Statement

We have not received a statement from the vendor.

Microsoft Vulnerability Research Unknown

Notified:  2025-03-31 Updated: 2025-06-10

CVE-2025-3052 Unknown

Vendor Statement

We have not received a statement from the vendor.

Phoenix Technologies Unknown

Notified:  2025-02-26 Updated: 2025-06-10

CVE-2025-3052 Unknown

Vendor Statement

We have not received a statement from the vendor.

Supermicro Unknown

Notified:  2025-04-02 Updated: 2025-06-10

CVE-2025-3052 Unknown

Vendor Statement

We have not received a statement from the vendor.

Toshiba Corporation Unknown

Notified:  2025-02-26 Updated: 2025-06-10

CVE-2025-3052 Unknown

Vendor Statement

We have not received a statement from the vendor.

View all 22 vendors View less vendors


Other Information

CVE IDs: CVE-2025-3052
API URL: VINCE JSON | CSAF
Date Public: 2025-06-10
Date First Published: 2025-06-10
Date Last Updated: 2025-06-16 16:30 UTC
Document Revision: 3

Sponsored by CISA.