NetMan304
New member
- Local time
- 3:39 PM
- Posts
- 4
- Location
- Washington State, USA
- OS
- Windows -10 22H2, 11 23H2, Server 2025. Linux - Fedora LTR, Red Hat Enterprise. VM Ware. Hiren's PE
Hello,
I have not been able to find assistance on this but if someone has found something please kindly link me a discussion that may already by started.
I won't beat this Black Lotus horse any more than it already has been... I find myself frustrated at the guidance in microsoft's official documentation on how to apply the mitigations ahead of the forced rollout:
How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932
Under the known issues section, I have a Dell Computer with a TPM 2.0.
I would like to get some guidance or a guide on how to rekey my machine and have the bad boot loaders revoked and not wait on a fix. is there any guidance on how to do so?
PS: I understand this is vague without any specifics. I will post them if this is the venue but for now I was more or less looking for a discussion on if this is possible, clarification on what the timing issues are with the TPM 2.0 systems and clarification on if this would be an appropriate venue for tackling this sort of task.
I have never been able to find this sort of guidance anywhere and as I am not a IT pro myself, or a complete security novice. I have a desire to tackle this sort of thing with a guide or how to.
Thanks! I look forward to any suggestions etc.
I have not been able to find assistance on this but if someone has found something please kindly link me a discussion that may already by started.
I won't beat this Black Lotus horse any more than it already has been... I find myself frustrated at the guidance in microsoft's official documentation on how to apply the mitigations ahead of the forced rollout:
How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932
Under the known issues section, I have a Dell Computer with a TPM 2.0.
Code:
TPM 2.0-based systems: These systems that run Windows Server 2012 and Windows Server 2012 R2
cannot deploy the mitigations released in the July 9, 2024 security update because of known compatibility issues with TPM measurements.
The July 9, 2024 security updates will block mitigations #2 (boot manager) and #3 (DBX update) on affected systems.
Microsoft is aware of the issue and an update will be released in the future to unblock TPM 2.0-based systems.
To check your TPM version, right-click Start, click Run, and then type tpm.msc.
On the bottom-right of the center pane under TPM Manufacturer Information,
you should see a value for Specification Version.
I would like to get some guidance or a guide on how to rekey my machine and have the bad boot loaders revoked and not wait on a fix. is there any guidance on how to do so?
PS: I understand this is vague without any specifics. I will post them if this is the venue but for now I was more or less looking for a discussion on if this is possible, clarification on what the timing issues are with the TPM 2.0 systems and clarification on if this would be an appropriate venue for tackling this sort of task.
I have never been able to find this sort of guidance anywhere and as I am not a IT pro myself, or a complete security novice. I have a desire to tackle this sort of thing with a guide or how to.
Thanks! I look forward to any suggestions etc.
- Windows Build/Version
- 22H2 OS Build 19045.5608
My Computer
System One
-
- OS
- Windows -10 22H2, 11 23H2, Server 2025. Linux - Fedora LTR, Red Hat Enterprise. VM Ware. Hiren's PE
- Computer type
- PC/Desktop
- Manufacturer/Model
- Dell, HP + Various