**Microsoft patches critical vulnerability in Windows devices**
For the past seven months—and likely longer—an industry-wide standard that protects Windows devices from firmware infections could be bypassed using a simple technique. On Tuesday, Microsoft finally patched the vulnerability.
The status of Linux systems is still unclear.
Tracked as CVE-2024-7344, the vulnerability made it possible for attackers who had already gained privileged access to a device to run malicious firmware during bootup. These types of attacks can be particularly pernicious because infections hide inside the firmware that runs at an early stage, before even Windows or Linux has loaded. This strategic position allows the malware to evade defenses installed by the OS and gives it the ability to survive even after hard drives have been reformatted. From then on, the resulting “bootkit” controls the operating system start.
In place since 2012, Secure Boot is designed to prevent these types of attacks by creating a chain-of-trust linking each file that gets loaded. Each time a device boots, Secure Boot verifies that each firmware component is digitally signed before it’s allowed to run. It then checks the OS bootloader’s digital signature to ensure that it’s trusted by the Secure Boot policy and hasn’t been tampered with. Secure Boot is built into the UEFI—the successor to the BIOS that’s responsible for booting modern Windows and Linux devices.
According to Microsoft, the vulnerability was discovered by security researchers at the University of California, Irvine, who reported it to the company in August. Since then, Microsoft has been working on a patch, which was released on Tuesday.
While the patch is a welcome development, it’s important to note that the vulnerability highlights the ongoing importance of cybersecurity in the digital age. As technology advances, so too do the threats to our online security. It’s crucial that we stay vigilant and work together to protect ourselves against these threats.
**Source:** Microsoft, University of California, Irvine
**What do you think about this vulnerability and the patch from Microsoft? Share your thoughts in the comments!**