
Microsoft has introduced a new PowerShell script to help users update bootable media with the “Windows UEFI CA 2023” certificate, addressing the BlackLotus UEFI bootkit vulnerability. This update is crucial before the enforcement of security mitigations planned for implementation by 2026.
The BlackLotus threat is particularly dangerous as it can:
– Bypass Secure Boot
– Disable critical Windows security features including BitLocker, HVCI, and Microsoft Defender
– Deploy malware with highest system privileges
– Operate undetected
Key Security Updates:
– March 2023 and July 2024: Security patches released (CVE-2023-24932)
– Implementation: Currently optional, becoming mandatory before 2026
– New Certificate: “Windows UEFI CA 2023” added to UEFI Secure Boot Database
– Old Certificate: “Windows Production CA 2011” to be revoked
The PowerShell Script:
– Helps update various bootable media types (ISO, USB, local/network drives)
– Requires Windows ADK installation
– Updates boot managers to use new certificate
– Essential for system recovery if boot issues occur after applying mitigations
Important Notes:
– Microsoft will provide six-month notice before mandatory enforcement
– Administrators should test updates before full implementation
– Recovery media must be updated to work with new security measures
– Script available for download from Microsoft’s official channels
This security update represents a significant step in protecting Windows systems against sophisticated UEFI bootkit attacks while ensuring system stability through a staged rollout approach.