CVE-2020-0689: Microsoft Secure Boot Security Feature Bypass Vulnerability
Overview
- Severity
- High (CVSS 8.2)
- CVSS Vector
- CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:F/RL:O/RC:C
- Category
- Security Feature Bypass
- Exploit Status
- Not Exploited
- Exploitation Likelihood
- Less Likely
- Publicly Disclosed
- Yes
- Patch Tuesday
- 2020-Feb
- Released
- 2020-02-11
- Last Updated
- 2022-11-15
- EPSS Score
- 0.13% (percentile: 32.9%)
Description
A security feature bypass vulnerability exists in secure boot. An attacker who successfully exploited the vulnerability can bypass secure boot and load untrusted software.
To exploit the vulnerability, an attacker could run a specially crafted application.
The security update addresses the vulnerability by blocking vulnerable third-party bootloaders.
For further information see Security update for Secure Boot DBX: January 12, 2021.
FAQ
Why are there different security update packages for this CVE?
These are standalone security updates. These packages must be installed in addition to the normal security updates to be protected from this vulnerability.
Are there any prerequisites to these security updates?
These security updates have a Servicing Stack Update prerequisite for specific KB numbers. The packages have a built in pre-requisite logic to ensure the ordering.
Customer should ensure that they have the following Servicing Stack Update installed before installing these standalone security updates:
Product
SSU Package
Date Released
Windows Server 2012
4566426
July 2020
Windows 8.1/Server 2012 R2
4524445
July 2020
Windows 10
4565911
July 2020
Windows 10 Version 1607/Server 2016
4576750
September 2020
Windows 10 1803/Windows Server, version 1803
4580398
October 2020
Windows 10 1809/Server 2019
4598480
January 2021
Windows 10 1909/Windows Server, version 1909
4598479
January 2021
If I need to manually install these standalone updates, a Servicing Stack Update, and a January 2021 Security Update, in what order should they be installed?
Customers who need to manually install these three updates should install them in the following order:
Servicing Stack Update
Standalone Secure Boot Update listed in this CVE
January 2021 Security Update
Customers whose systems are configured to receive automatic updates will automatically receive these updates in the correct order.
Is there anything else that I should know about these updates?
If Windows Defender Credential Guard (Virtual Secure Mode) is enabled, two additional reboots will be required.
Why have the x86 and ARM64 versions of Windows been removed from the Security Updates table?
The x86 and ARM64 versions of Windows have been removed because these architectures are not affected by this vulnerability.
Affected Products (16)
Windows
- Windows 10 Version 1803 for x64-based Systems
- Windows Server, version 1803 (Server Core Installation)
- Windows 10 Version 1809 for x64-based Systems
- Windows Server 2019
- Windows Server 2019 (Server Core installation)
- Windows 10 for x64-based Systems
- Windows 10 Version 1607 for x64-based Systems
- Windows Server 2016
- Windows Server 2016 (Server Core installation)
- Windows 8.1 for x64-based systems
- Windows Server 2012
- Windows Server 2012 (Server Core installation)
- Windows Server 2012 R2
- Windows Server 2012 R2 (Server Core installation)
- Windows 10 Version 1909 for x64-based Systems
- Windows Server, version 1909 (Server Core installation)
Security Updates (2)
Revision History
- 2020-02-11: Information published.
- 2020-02-12: Updated the FAQ to include order of installation for Servicing Stack, standalone updates for this vulnerability, and February Security updates. This is an informational change only.
- 2021-01-12: To comprehensively address CVE-2020-0689, Microsoft has released Security Update 4535680 for all affected versions of Windows 10; Windows 8.1 and Server 2012 R2, and Windows Server 2012. In addition, the following revisions have been made: 1) Updated Servicing Stack Updates (SSU) to reflect the most recent SSU for affected Windows versions. 2) Removed all 32-bit and ARM64-based versions of Windows from the Security Updates table as these architectures are not affected by the vulnerability. 3) Removed versions of Windows that are no longer in support from the Security Updates table as there is no update available for them.
- 2022-11-15: In the Security Updates table, updated the Download and Article links to provide links to standalone security update KB5012170 for Secure Boot. This update supersedes previous updates KB4535680 and KB4524244, which have been expired as of November 2022. Microsoft recommends that customers install KB5012170 to be fully protected from this vulnerability. Customers whose systems are configured to receive automatic updates do not need to take any further action. Please note that KB5012170 is not available for Windows 10 version 1803 and Windows 10 version 1909 as these versions are no longer in support. For more information see KB5012170.