Locked Down but Not Out: Fighting the Hidden War in Your Bootloader
This talk explores the security challenges of UEFI Secure Boot, focusing on the difficulty of revoking vulnerable bootloaders and the risks posed by a large, decentralized ecosystem of signed binaries. It highlights how memory corruption vulnerabilities in boot-time components can be exploited to bypass security boundaries, even on fully patched systems. The speaker discusses the limitations of the DBX (revocation list) and the complexities of managing trust in a supply chain where third-party vendors share code. The presentation concludes with a discussion on future-facing mitigations like Measured Boot and the need for improved firmware transparency and auditability.
The Silent Failure of UEFI Secure Boot: Why Your Revocation List is Already Obsolete
TLDR: UEFI Secure Boot is failing to protect modern systems because the revocation list (DBX) is too small to handle the massive volume of vulnerable, signed bootloaders currently in circulation. Attackers are exploiting this by performing "rollback attacks," where they replace current, patched bootloaders with older, signed, but vulnerable versions. This research highlights that patching the vulnerability is only half the battle; without effective, scalable revocation, your system remains exposed to pre-OS exploitation.
Security researchers have long treated UEFI Secure Boot as the final line of defense for system integrity. The assumption is simple: if the firmware verifies the signature of the bootloader, the system is safe from unauthorized code execution at the earliest stages of the boot process. However, this model relies entirely on the assumption that a signed binary is inherently trustworthy. As recent research into CVE-2022-21894 and CVE-2023-40547 demonstrates, this assumption is fundamentally flawed. We are currently fighting a hidden war in the bootloader, and the current mechanisms for managing trust are losing.
The Mechanics of the Rollback Attack
The core issue is that Secure Boot is not a security boundary in the traditional sense; it is a feature that attempts to enforce trust in a highly decentralized ecosystem. When a vulnerability is discovered in a bootloader, the vendor releases a patch. But the old, vulnerable, yet still validly signed bootloader remains on the disk. An attacker with administrative privileges or physical access can simply replace the patched bootloader with the older, vulnerable version.
Because the old version is still signed by a trusted authority, the UEFI firmware happily executes it. This is the essence of a rollback attack. To stop this, we rely on the DBX (Denied Signature Database), a revocation list stored in UEFI variables. The problem is that the DBX has a hard limit on storage space—roughly 32 KB on many systems—which translates to only a few hundred unique hashes. With over 16,000 signed bootloaders in the wild, we have already exhausted the capacity to revoke every vulnerable version.
When "Fixed" Doesn't Mean Secure
The research into the BlackLotus bootkit perfectly illustrates the failure of the current revocation model. Even after Microsoft released patches for the underlying vulnerabilities, the ecosystem remained vulnerable because the revocation process was not, and could not be, applied universally.
Consider the technical reality of the Linux Shim. It is designed to load secondary drivers like GRUB2, verifying them against a certificate embedded in the shim. When a vulnerability like the one identified in CVE-2023-40547 occurs—an out-of-bounds write during HTTP header parsing—the fix requires updating the shim. However, because the shim is signed by a central authority, revoking the old version requires updating the DBX on every single machine. If the DBX is full, or if the update is not pushed, the old, vulnerable shim remains a viable target for an attacker.
The Practical Reality for Pentesters
For those of us conducting red team engagements, this is a goldmine. If you gain administrative access to a target machine, you are not limited to the current, patched state of the OS. You can inspect the EFI System Partition (ESP), identify the bootloader version, and check it against known vulnerable versions. If the system has not been updated with the latest DBX entries, you can downgrade the bootloader to a version that allows you to bypass signature verification or execute arbitrary code before the kernel even loads.
This technique is particularly effective because it operates entirely outside the visibility of standard EDR solutions. Once you have compromised the boot process, you have effectively subverted the entire chain of trust. You can load your own malicious drivers, disable security features, or persist in a way that survives OS reinstallation.
Moving Toward Firmware Transparency
Defending against this requires a shift in how we view firmware updates. We cannot continue to rely on a static, limited-size revocation list. The industry needs to move toward more robust mechanisms like Measured Boot, which uses the TPM (Trusted Platform Module) to record the state of the boot process. By "measuring" each component before it executes, we can detect if a bootloader has been tampered with or rolled back, even if it is technically "signed."
Furthermore, we need to demand better firmware transparency from our vendors. The current practice of "signing everything" without adequate auditing of the third-party code included in those binaries is a recipe for disaster. If a vendor signs a binary, they are vouching for every line of code within it, including the obscure, rarely used features that often harbor the most critical vulnerabilities.
The next time you are auditing a system, don't just look at the OS patches. Look at the ESP. Look at the bootloader versions. The war for system integrity is being fought in the milliseconds before the operating system starts, and right now, the attackers have the advantage of a fragmented, poorly managed supply chain. It is time we started treating firmware with the same level of scrutiny we apply to our application code.
Vulnerability Classes
Tools Used
Target Technologies
Attack Techniques
Up Next From This Conference
Similar Talks

Inside the FBI's Secret Encrypted Phone Company 'Anom'

Hacking Apple's USB-C Port Controller




