TPM 2.0 Devices and remediation of CVE-2023-24932 (Black Lotus) UEFI / Secure Boot Vulnerability. - Help for those with "Known Issues"


NetMan304

Member
Local time
8:38 PM
Posts
8
Location
Washington State, USA
OS
Windows -10 22H2
Hello,
I have not been able to find assistance on this but if someone has found something please kindly link me a discussion that may already by started.

I won't beat this Black Lotus horse any more than it already has been... I find myself frustrated at the guidance in microsoft's official documentation on how to apply the mitigations ahead of the forced rollout:
How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932

Under the known issues section, I have a Dell Computer with a TPM 2.0.
Code:
TPM 2.0-based systems:  These systems that run Windows Server 2012 and Windows Server 2012 R2 
cannot deploy the mitigations released in the July 9, 2024 security update because of known compatibility issues with TPM measurements. 
The July 9, 2024 security updates will block mitigations #2 (boot manager) and #3 (DBX update) on affected systems.

Microsoft is aware of the issue and an update will be released in the future to unblock TPM 2.0-based systems.

To check your TPM version, right-click Start, click Run, and then type tpm.msc. 
On the bottom-right of the center pane under TPM Manufacturer Information, 
you should see a value for Specification Version.

I would like to get some guidance or a guide on how to rekey my machine and have the bad boot loaders revoked and not wait on a fix. is there any guidance on how to do so?

PS: I understand this is vague without any specifics. I will post them if this is the venue but for now I was more or less looking for a discussion on if this is possible, clarification on what the timing issues are with the TPM 2.0 systems and clarification on if this would be an appropriate venue for tackling this sort of task.

I have never been able to find this sort of guidance anywhere and as I am not a IT pro myself, or a complete security novice. I have a desire to tackle this sort of thing with a guide or how to.

Thanks! I look forward to any suggestions etc.
 
Windows Build/Version
22H2 OS Build 19045.5608

My Computer

System One

  • OS
    Windows -10 22H2
    Computer type
    PC/Desktop
    Manufacturer/Model
    Dell Vostro 3671
    CPU
    intel 9xxx 6 core 3.6ghz
    Motherboard
    Dell Vostro 3671 OEM
    Memory
    16GB DDR4 2000MHZ
    Graphics Card(s)
    Integrated
    Sound Card
    integrated
    Monitor(s) Displays
    multi
    Screen Resolution
    4k 24"
    Hard Drives
    1TB PNY PCIx16 NVMe M.2
    700 GB Samsung HDD 2.5 (X2)
    500 GB WD SSD 2.5"
    PSU
    OEM 300 Watt
    Case
    OEM
    Cooling
    Dual Fan
    Keyboard
    Dell Wired keyboard
    Mouse
    Microsoft Wireless Optical
    Internet Speed
    10 Mb up / 100 Mb dn
    Browser
    Firefox ESR / Chrome
    Antivirus
    1-2 Apple / Day

My Computers

System One System Two

  • OS
    Windows 11 Pro 24H2 26100.3194
    Computer type
    PC/Desktop
    Manufacturer/Model
    Dell Optiplex 7080
    CPU
    i9-10900 10 core 20 threads
    Motherboard
    DELL 0J37VM
    Memory
    32 gb
    Graphics Card(s)
    none-Intel UHD Graphics 630
    Sound Card
    Integrated Realtek
    Monitor(s) Displays
    Benq 27
    Screen Resolution
    2560x1440
    Hard Drives
    1tb Solidigm m.2 nvme+256gb SKHynix m.2 nvme /External drives 512gb Samsung m.2 sata+1tb Kingston m2.nvme+ 4gb Solidigm nvme
    PSU
    500w
    Case
    MT
    Cooling
    Dell Premium
    Keyboard
    Logitech wired
    Mouse
    Logitech wireless
    Internet Speed
    so slow I'm too embarrassed to tell
    Browser
    #1 Edge #2 Firefox
    Antivirus
    Defender+MWB Premium
  • Operating System
    Windows 10 Pro 22H2 19045.3930
    Computer type
    PC/Desktop
    Manufacturer/Model
    Dell Optiplex 9020
    CPU
    i7-4770
    Memory
    24 gb
    Monitor(s) Displays
    Benq 27
    Screen Resolution
    2560x1440
    Hard Drives
    256 gb Toshiba BG4 M.2 NVE SSB and 1 tb hdd
    PSU
    500w
    Case
    MT
    Cooling
    Dell factory
    Mouse
    Logitech wireless
    Keyboard
    Logitech wired
    Internet Speed
    still not telling
    Browser
    Firefox
    Antivirus
    Defender+MWB Premium
Welcome.

I’m a little lost because I am also not really an IT person. So you’re trying to install Windows or update without luck due to TPM2 issues and Secure Boot? Wanting to beat whatever is coming.

22H2 is really old.

If so, have you tried creating the install media and installing with Rufus?
Using as a fresh install media or for an in-place upgrade

IMG_5343.webp



As much as RUFUS can bypass TPM2.0 secure boot to upgrade to Windows 11 24H2, it will not work if the CPU lacks SSE4.2. Nothing will.

Again, I’m most likely out of my league and have mistaken your issue. Don’t try explaining, better I butt out.

P.S.

Here is a page that contains a security update posted in relation to CVE-2023-24932, created 6 days after July 9th (July 15th 2024)

 

My Computers

System One System Two

  • OS
    Windows 11 Pro 23H2 Build 22631.5039
    Computer type
    PC/Desktop
    Manufacturer/Model
    Sin-built
    CPU
    Intel(R) Core(TM) i7-4770K CPU @ 3.50GHz (4th Gen?)
    Motherboard
    ASUS ROG Maximus VI Formula
    Memory
    32.0 GB of I forget and the box is in storage.
    Graphics Card(s)
    Gigabyte nVidia GeForce GTX 1660 Super OC 6GB
    Sound Card
    Onboard
    Monitor(s) Displays
    4 x LG 23MP75 - 2 x 24MK430H-B - 1 x Wacom Pro 22" Tablet
    Screen Resolution
    All over the place
    Hard Drives
    Too many to list.
    OS on Samsung 1TB 870 QVO SATA
    PSU
    Silverstone 1500
    Case
    NZXT Phantom 820 Full-Tower Case
    Cooling
    Noctua NH-D15 Elite Class Dual Tower CPU Cooler / 6 x EziDIY 120mm / 2 x Corsair 140mm somethings / 1 x 140mm Thermaltake something / 2 x 200mm Corsair.
    Keyboard
    Corsair K95 / Logitech diNovo Edge Wireless
    Mouse
    Logitech G402 / G502 / Mx Masters / MX Air Cordless
    Internet Speed
    100/40Mbps
    Browser
    All sorts
    Antivirus
    Kaspersky Premium
    Other Info
    I’m on a horse.
  • Operating System
    Windows 11 Pro 23H2 Build: 22631.4249
    Computer type
    Laptop
    Manufacturer/Model
    LENOVO Yoga 7i EVO OLED 14" Touchscreen i5 12 Core 16GB/512GB
    CPU
    Intel Core 12th Gen i5-1240P Processor (1.7 - 4.4GHz)
    Memory
    16GB LPDDR5 RAM
    Graphics card(s)
    Intel Iris Xe Graphics Processor
    Sound Card
    Optimized with Dolby Atmos®
    Screen Resolution
    QHD 2880 x 1800 OLED
    Hard Drives
    M.2 512GB
    Antivirus
    Defender / Malwarebytes
    Other Info
    …still on a horse.
Under the known issues section, I have a Dell Computer with a TPM 2.0.
Code:
TPM 2.0-based systems:  These systems that run Windows Server 2012 and Windows Server 2012 R2
cannot deploy the mitigations released in the July 9, 2024 security update because of known compatibility issues with TPM measurements.
The July 9, 2024 security updates will block mitigations #2 (boot manager) and #3 (DBX update) on affected systems.

Microsoft is aware of the issue and an update will be released in the future to unblock TPM 2.0-based systems.
Unless you're running Server 2012 on your PC's, this warning is irrelevant to you.
 

My Computer

System One

  • OS
    Windows 7
Unless you're running Server 2012 on your PC's, this warning is irrelevant to you.


That’s what I was wondering when reading all that documentation. It referenced Server 2012 and Windows 8/8.1. That goes also for the download patches I linked to. Hence my confusion.
 

My Computers

System One System Two

  • OS
    Windows 11 Pro 23H2 Build 22631.5039
    Computer type
    PC/Desktop
    Manufacturer/Model
    Sin-built
    CPU
    Intel(R) Core(TM) i7-4770K CPU @ 3.50GHz (4th Gen?)
    Motherboard
    ASUS ROG Maximus VI Formula
    Memory
    32.0 GB of I forget and the box is in storage.
    Graphics Card(s)
    Gigabyte nVidia GeForce GTX 1660 Super OC 6GB
    Sound Card
    Onboard
    Monitor(s) Displays
    4 x LG 23MP75 - 2 x 24MK430H-B - 1 x Wacom Pro 22" Tablet
    Screen Resolution
    All over the place
    Hard Drives
    Too many to list.
    OS on Samsung 1TB 870 QVO SATA
    PSU
    Silverstone 1500
    Case
    NZXT Phantom 820 Full-Tower Case
    Cooling
    Noctua NH-D15 Elite Class Dual Tower CPU Cooler / 6 x EziDIY 120mm / 2 x Corsair 140mm somethings / 1 x 140mm Thermaltake something / 2 x 200mm Corsair.
    Keyboard
    Corsair K95 / Logitech diNovo Edge Wireless
    Mouse
    Logitech G402 / G502 / Mx Masters / MX Air Cordless
    Internet Speed
    100/40Mbps
    Browser
    All sorts
    Antivirus
    Kaspersky Premium
    Other Info
    I’m on a horse.
  • Operating System
    Windows 11 Pro 23H2 Build: 22631.4249
    Computer type
    Laptop
    Manufacturer/Model
    LENOVO Yoga 7i EVO OLED 14" Touchscreen i5 12 Core 16GB/512GB
    CPU
    Intel Core 12th Gen i5-1240P Processor (1.7 - 4.4GHz)
    Memory
    16GB LPDDR5 RAM
    Graphics card(s)
    Intel Iris Xe Graphics Processor
    Sound Card
    Optimized with Dolby Atmos®
    Screen Resolution
    QHD 2880 x 1800 OLED
    Hard Drives
    M.2 512GB
    Antivirus
    Defender / Malwarebytes
    Other Info
    …still on a horse.
So you’re trying to install Windows or update without luck due to TPM2 issues and Secure Boot?
22H2 is really old.
Let me clarify. I'm trying to do a clean install of Windows 10 that includes The mitigations for Black lotus all at once. Reload Bios / uefi from clean install using updated bootloader's and resetting Tpm with new keys, that aren't compromised.

I'm choosing Windows 10 due to personal preference. My computer is also compatible with Windows 11, per the manufacturer (Dell)

I can install Windows 10 just fine but since I have a TPM 2.0 the black lotus mitigation step #2 and #3 are automatically blocked on my system. This is in line with the documentation for Microsoft that states this will happen on those affected (tpm 2.0) systems + others.

I'm looking for a way to have a system with the mitigations applied for black lotus and not just a system that relies on revoked or vulnerable bootloaders.

Essentially I would like to apply the mitigations proactively and not wait for forced roll out.

Unless you're running Server 2012 on your PC's, this warning is irrelevant to you.
I've always been under the impression that since these articles are geared towards IT professionals they only list "IT professional" builds as affected. It does appear that steps #2 and #3 are being blocked on my system.

Yes an update SHOULD be issued by Microsoft and / or OEM in due time but I am not wanting to wait..... If possible
 

My Computer

System One

  • OS
    Windows -10 22H2
    Computer type
    PC/Desktop
    Manufacturer/Model
    Dell Vostro 3671
    CPU
    intel 9xxx 6 core 3.6ghz
    Motherboard
    Dell Vostro 3671 OEM
    Memory
    16GB DDR4 2000MHZ
    Graphics Card(s)
    Integrated
    Sound Card
    integrated
    Monitor(s) Displays
    multi
    Screen Resolution
    4k 24"
    Hard Drives
    1TB PNY PCIx16 NVMe M.2
    700 GB Samsung HDD 2.5 (X2)
    500 GB WD SSD 2.5"
    PSU
    OEM 300 Watt
    Case
    OEM
    Cooling
    Dual Fan
    Keyboard
    Dell Wired keyboard
    Mouse
    Microsoft Wireless Optical
    Internet Speed
    10 Mb up / 100 Mb dn
    Browser
    Firefox ESR / Chrome
    Antivirus
    1-2 Apple / Day
Yes an update SHOULD be issued by Microsoft and / or OEM in due time but I am not wanting to wait


I can’t help but keep coming back to the fact Microsoft has dealt with this in 2023 & July 2024 . Also, again, Build 22H2 is extremely old and in itself, probably a security issue.


And again, again. I should probably stay out of it. Garlin always buries me with his knowledge.
 

My Computers

System One System Two

  • OS
    Windows 11 Pro 23H2 Build 22631.5039
    Computer type
    PC/Desktop
    Manufacturer/Model
    Sin-built
    CPU
    Intel(R) Core(TM) i7-4770K CPU @ 3.50GHz (4th Gen?)
    Motherboard
    ASUS ROG Maximus VI Formula
    Memory
    32.0 GB of I forget and the box is in storage.
    Graphics Card(s)
    Gigabyte nVidia GeForce GTX 1660 Super OC 6GB
    Sound Card
    Onboard
    Monitor(s) Displays
    4 x LG 23MP75 - 2 x 24MK430H-B - 1 x Wacom Pro 22" Tablet
    Screen Resolution
    All over the place
    Hard Drives
    Too many to list.
    OS on Samsung 1TB 870 QVO SATA
    PSU
    Silverstone 1500
    Case
    NZXT Phantom 820 Full-Tower Case
    Cooling
    Noctua NH-D15 Elite Class Dual Tower CPU Cooler / 6 x EziDIY 120mm / 2 x Corsair 140mm somethings / 1 x 140mm Thermaltake something / 2 x 200mm Corsair.
    Keyboard
    Corsair K95 / Logitech diNovo Edge Wireless
    Mouse
    Logitech G402 / G502 / Mx Masters / MX Air Cordless
    Internet Speed
    100/40Mbps
    Browser
    All sorts
    Antivirus
    Kaspersky Premium
    Other Info
    I’m on a horse.
  • Operating System
    Windows 11 Pro 23H2 Build: 22631.4249
    Computer type
    Laptop
    Manufacturer/Model
    LENOVO Yoga 7i EVO OLED 14" Touchscreen i5 12 Core 16GB/512GB
    CPU
    Intel Core 12th Gen i5-1240P Processor (1.7 - 4.4GHz)
    Memory
    16GB LPDDR5 RAM
    Graphics card(s)
    Intel Iris Xe Graphics Processor
    Sound Card
    Optimized with Dolby Atmos®
    Screen Resolution
    QHD 2880 x 1800 OLED
    Hard Drives
    M.2 512GB
    Antivirus
    Defender / Malwarebytes
    Other Info
    …still on a horse.
To summarize in simple terms:

1. MS was informed a previous version of the EFI boot file wasn't secure, and was being actively exploited by hackers. To prevent its abuse, MS needed to ban several variants of the boot file by revoking the boot file's signing certificate (issued by MS). When Secure Boot is enabled, the old boot file will no longer work.

This will force everyone to replace the EFI boot file with a new boot file provided by MS. The new boot file is included in W10 and W11 Monthly Updates since at least June 2024, but not automatically installed for active use.

Before moving ahead, you need to consider:
- Do I have a dual boot setup where an older Windows version exists and it doesn't have/get a copy of the new boot file. By revoking the old file, these Windows systems are unbootable and MS won't provide you a workaround (though someone might post a fix).

- Do I have a bootable ISO media that's older than Dec 2023? It will have the same outdated boot file, and won't be usable unless you follow specific steps to replace the file(s). If you're only committed to running W11 24H2, there isn't a problem.

2. Before the new boot file is permitted, a new signing certificate (issued by MS) needs to be installed to the UEFI's DB ("Allowed signers") database. Adding the new signing certificate (without revoking the old cert) will allow both versions of the boot file to work.

3. When the old signing certificate is added to the UEFI's DBX ("Banned signers") database, all old boot files dating back to Windows 8 stop working if Secure Boot is enabled. Windows itself has to know when to switch the boot file from the old to the new version. You can only have one version of the boot file in place at a time.

4. These steps are done by changing specific registry keys, and rebooting Windows twice in a row (with a bit of a pause to allow it to do some background tasks related to the transition). Failure to follow the steps in sequence could prevent your Windows from booting again. Unless you enter UEFI and temporarily disable Secure Boot mode.

MS originally intended to make the revocation changes mandatory and be automatically applied. But there's enough early issues with selected PC and software partners, that it's left as a voluntary process for now.


Presuming you're read, and understand the answers to the two questions from (#1), jump down to the "Mitigation deployment guidelines"

- Check your Windows has been updated to anything newer than June 2024's updates.

- If you have BitLocker enabled, make a backup copy of the key. Or temporarily turn off BitLocker before running the steps. You can re-enable BitLocker if the migration succeeds.

- You do not need to follow the steps for updating install media, if you're only going to use the latest W11 24H2 ISO to re-install Windows in the future.
 

My Computer

System One

  • OS
    Windows 7
I'm mystified by this. Do regular 24H2 users need to take any action?
 

My Computer

System One

  • OS
    Windows 11 Pro
    Computer type
    PC/Desktop
    Manufacturer/Model
    Self build
    CPU
    Core i7-13700K
    Motherboard
    Asus TUF Gaming Plus WiFi Z790
    Memory
    64 GB Kingston Fury Beast DDR5
    Graphics Card(s)
    Gigabyte GeForce RTX 2060 Super Gaming OC 8G
    Sound Card
    Realtek S1200A
    Monitor(s) Displays
    Viewsonic VP2770
    Screen Resolution
    2560 x 1440
    Hard Drives
    Kingston KC3000 2TB NVME SSD & SATA HDDs & SSD
    PSU
    EVGA SuperNova G2 850W
    Case
    Nanoxia Deep Silence 1
    Cooling
    Noctua NH-D14
    Keyboard
    Microsoft Digital Media Pro
    Mouse
    Logitech Wireless
    Internet Speed
    50 Mb / s
    Browser
    Chrome
    Antivirus
    Defender
I can’t help but keep coming back to the fact Microsoft has dealt with this in 2023 & July 2024 . Also, again, Build 22H2 is extremely old and in itself, probably a security issue.


And again, again. I should probably stay out of it. Garlin always buries me with his knowledge.

The solution does not work for my particular system. the Microsoft documentation states that the mitigations are blocked for TPM 2.0 systems and when I try to run that script it's just abruptly closes on me without any error.

My build may not be the freshest OS that Microsoft makes but it still is a currently updated and patched distribution.
 

My Computer

System One

  • OS
    Windows -10 22H2
    Computer type
    PC/Desktop
    Manufacturer/Model
    Dell Vostro 3671
    CPU
    intel 9xxx 6 core 3.6ghz
    Motherboard
    Dell Vostro 3671 OEM
    Memory
    16GB DDR4 2000MHZ
    Graphics Card(s)
    Integrated
    Sound Card
    integrated
    Monitor(s) Displays
    multi
    Screen Resolution
    4k 24"
    Hard Drives
    1TB PNY PCIx16 NVMe M.2
    700 GB Samsung HDD 2.5 (X2)
    500 GB WD SSD 2.5"
    PSU
    OEM 300 Watt
    Case
    OEM
    Cooling
    Dual Fan
    Keyboard
    Dell Wired keyboard
    Mouse
    Microsoft Wireless Optical
    Internet Speed
    10 Mb up / 100 Mb dn
    Browser
    Firefox ESR / Chrome
    Antivirus
    1-2 Apple / Day
So i did a bunch of research today and I found some pretty lengthy articles about how TPM work and I'm definitely a lot more knowledgeable on their role in secure boot.
I believe I would feel up to resetting the TPM and clearing everything although I haven't been able to find any documentation on why the black lotus mitigations are intentionally blocked due to TPM 2.0 systems... something to do with the timing of them.

One of the articles i found regarding the nuances of ensuring your tpm is configured securely:

TPM Attestation

None of the articles clarify / provide insight as to why Microsoft would block bootloader revocations on TPM 2.0 systems and leave these systems unpatched.
 

My Computer

System One

  • OS
    Windows -10 22H2
    Computer type
    PC/Desktop
    Manufacturer/Model
    Dell Vostro 3671
    CPU
    intel 9xxx 6 core 3.6ghz
    Motherboard
    Dell Vostro 3671 OEM
    Memory
    16GB DDR4 2000MHZ
    Graphics Card(s)
    Integrated
    Sound Card
    integrated
    Monitor(s) Displays
    multi
    Screen Resolution
    4k 24"
    Hard Drives
    1TB PNY PCIx16 NVMe M.2
    700 GB Samsung HDD 2.5 (X2)
    500 GB WD SSD 2.5"
    PSU
    OEM 300 Watt
    Case
    OEM
    Cooling
    Dual Fan
    Keyboard
    Dell Wired keyboard
    Mouse
    Microsoft Wireless Optical
    Internet Speed
    10 Mb up / 100 Mb dn
    Browser
    Firefox ESR / Chrome
    Antivirus
    1-2 Apple / Day
None of the articles clarify / provide insight as to why Microsoft would block bootloader revocations on TPM 2.0 systems and leave these systems unpatched.

Not all TPM 2.0 systems, just those running Windows Server 2012.

1742979054639.webp
 

My Computers

System One System Two

  • OS
    Win 11 Pro 24H2 26100.3624
    Computer type
    PC/Desktop
    Manufacturer/Model
    Self Built
    CPU
    Intel® Core™ i7-14700F
    Motherboard
    ASUS TUF GAMING Z690-PLUS WIFI
    Memory
    G.SKILL Ripjaws S5 Series 64GB (2 x 32GB) DDR5
    Graphics Card(s)
    MSI GeForce RTX 3060 Ventus 2X 12GB OC
    Sound Card
    Sound Blaster AE-5 Plus
    Monitor(s) Displays
    ASUS TUF Gaming 27" 2K HDR Gaming
    Screen Resolution
    2560 x 1440
    Hard Drives
    Samsung 990 Pro 1TB NVMe (Win 11 24H2)
    SK hynix P41 500GB NVMe (Win 11 23H2)
    SK hynix P41 2TB NVMe (x3)
    Crucial P3 Plus 4TB
    PSU
    Corsair RM850x Shift
    Case
    Antec Dark Phantom DP502 FLUX
    Cooling
    Noctua NH-U12A chromax.black + 7 Phantek T-30's
    Keyboard
    Logitech MK 320
    Mouse
    Razer Basilisk V3
    Internet Speed
    350Mbs
    Browser
    Firefox
    Antivirus
    Winows Security
    Other Info
    Windows 11 24H2 26100.3624 (VHDX)
    On System One (Dual Boot)
  • Operating System
    Win 11 Pro 24H2 26100.3624
    Computer type
    PC/Desktop
    Manufacturer/Model
    Self Built
    CPU
    Intel Core i7-11700F
    Motherboard
    Asus TUF Gaming Z590 Plus WiFi
    Memory
    64 GB DDR4
    Graphics card(s)
    EVGA GeForce RTX 2060
    Sound Card
    SoundBlaster X-Fi Titanium
    Monitor(s) Displays
    Samsung F27T350
    Screen Resolution
    1920x1080
    Hard Drives
    Samsung 980 Pro 1TB
    Samsung 970 EVO Plus 2TB
    Samsung 870 EVO 500GB SSD
    PSU
    Corsair HX750
    Case
    Cougar MX330-G Window
    Cooling
    Hyper 212 EVO
    Internet Speed
    350Mbps
    Browser
    Firefox
    Antivirus
    Windows Security
Garlin: Thank you for your thorough explanation.
Although,
I must admit I'm struggling to feel confident that I've conveyed my intentions with this thread accurately.
With all due respect, I feel like I'm communicating with AI.
I understand why they are necessary and how the revocations work.
I understand the risks.

What i don't understand is how to apply them on a TPM 2.0 system and what exactly the concern is that has caused Microsoft to withold the mitigations on those systems.

Not all TPM 2.0 systems, just those running Windows Server 2012.

View attachment 129443

Yes i see that it says only server but seeing as my windows 10 pro version is definitely having the mitigations withheld as well I'd venture to say that it's all windows builds that have a TPM 2.0 system and the only ones they mentioned in the articles as affected are the only ones that should be being modified by IT professionals and not consumer versions that get updates rolled out by Microsoft.... IMHO

These articles are not for consumers running consumer versions of Windows and therefore consumer builds are not "affected".

I may just have to try and apply them and see what happens. Not that it will be a noticable issue but seeing as i can't even get a conversation going on the topic, it may be my only option.

I may call Microsoft Or maybe TCG. I'll post back with results.

Are there any other TPM 2.0 users that find themselves frustrated by the lack luster patch schedule for these critical security vulnerabilities?

Thanks
 

My Computer

System One

  • OS
    Windows -10 22H2
    Computer type
    PC/Desktop
    Manufacturer/Model
    Dell Vostro 3671
    CPU
    intel 9xxx 6 core 3.6ghz
    Motherboard
    Dell Vostro 3671 OEM
    Memory
    16GB DDR4 2000MHZ
    Graphics Card(s)
    Integrated
    Sound Card
    integrated
    Monitor(s) Displays
    multi
    Screen Resolution
    4k 24"
    Hard Drives
    1TB PNY PCIx16 NVMe M.2
    700 GB Samsung HDD 2.5 (X2)
    500 GB WD SSD 2.5"
    PSU
    OEM 300 Watt
    Case
    OEM
    Cooling
    Dual Fan
    Keyboard
    Dell Wired keyboard
    Mouse
    Microsoft Wireless Optical
    Internet Speed
    10 Mb up / 100 Mb dn
    Browser
    Firefox ESR / Chrome
    Antivirus
    1-2 Apple / Day
Mitigations are not automatic yet, the final goal to have Windows silently perform this task. But as you can see in the instructions, it requires two phases of reg key changes and reboots. MS isn't being "lackluster", it recognizes the opportunity for someone who isn't technical to "brick" their system is high, which is why they're proceeding with caution.

The framework to roll out the changes are already embedded inside a patched W10 or 11 system today. If you don't feel comfortable to follow the process today, that's your prerogative. But you can't say MS isn't concerned. Implementing the changes is far cleaner than where MS was about a year ago.
 

My Computer

System One

  • OS
    Windows 7
Are there any other TPM 2.0 users that find themselves frustrated by the lack luster patch schedule for these critical security vulnerabilities?
IMO ....some users did manually apply the revocations, but more did not. I'm sure most corporate IT departments did since Black Lotus malware is geared to attacking corporate environments. But for domestic users, I think only those who are paranoid about security applied the revocations before MS rolls them out automatically.

While yes, you are receiving security updates now using 22h2, you won't get updates come October of this year. I would be more concerned about getting Windows 11 up to date than I would be about the revocations. But that's just me.
 

My Computers

System One System Two

  • OS
    Windows 11 Pro 24H2 26100.3194
    Computer type
    PC/Desktop
    Manufacturer/Model
    Dell Optiplex 7080
    CPU
    i9-10900 10 core 20 threads
    Motherboard
    DELL 0J37VM
    Memory
    32 gb
    Graphics Card(s)
    none-Intel UHD Graphics 630
    Sound Card
    Integrated Realtek
    Monitor(s) Displays
    Benq 27
    Screen Resolution
    2560x1440
    Hard Drives
    1tb Solidigm m.2 nvme+256gb SKHynix m.2 nvme /External drives 512gb Samsung m.2 sata+1tb Kingston m2.nvme+ 4gb Solidigm nvme
    PSU
    500w
    Case
    MT
    Cooling
    Dell Premium
    Keyboard
    Logitech wired
    Mouse
    Logitech wireless
    Internet Speed
    so slow I'm too embarrassed to tell
    Browser
    #1 Edge #2 Firefox
    Antivirus
    Defender+MWB Premium
  • Operating System
    Windows 10 Pro 22H2 19045.3930
    Computer type
    PC/Desktop
    Manufacturer/Model
    Dell Optiplex 9020
    CPU
    i7-4770
    Memory
    24 gb
    Monitor(s) Displays
    Benq 27
    Screen Resolution
    2560x1440
    Hard Drives
    256 gb Toshiba BG4 M.2 NVE SSB and 1 tb hdd
    PSU
    500w
    Case
    MT
    Cooling
    Dell factory
    Mouse
    Logitech wireless
    Keyboard
    Logitech wired
    Internet Speed
    still not telling
    Browser
    Firefox
    Antivirus
    Defender+MWB Premium
I'll play with this again. It's been a long time since I played with this, but I was easily able to patch all my systems. I even scripted a lot of the steps. But that was probably a good year ago.

I'll post back once I update all my procedures based upon the latest info. It's low priority so it may be a couple days.
 

My Computers

System One System Two

  • OS
    Win11 Pro 24H2
    Computer type
    PC/Desktop
    Manufacturer/Model
    Self-built
    CPU
    Intel i7 11700K
    Motherboard
    ASUS Prime Z590-A MB
    Memory
    64GB (Waiting for warranty replacement of another 64GB for 128GB total)
    Graphics Card(s)
    No GPU - Built-in Intel Graphics
    Sound Card
    Integrated
    Monitor(s) Displays
    HP Envy 32
    Screen Resolution
    2560 x 1440
    Hard Drives
    1 x 1TB NVMe SSD
    1 x 2TB NVMe SSD
    1 x 4TB NVMe SSD
    3 x 512GB 2.5" SSD
    1 x 4TB 2.5" SSD
    5 x 8TB Seagate Barracuda HDD
    PSU
    Corsair HX850i
    Case
    Corsair iCUE RGB 5000X mid tower case
    Cooling
    Noctua NF-S12A chromax.black.swap case fans (Qty. 7) & Home Computer Specifications, Configuration, and Usage Notes General Specifications ASUS Prime Z590-A motherboard, serial number M1M0KC222467ARP Intel Core i7-11700K CPU (11th Gen Rocket Lake / LGA 1200 Socket) 128GB Crucial Ballistix RGB DDR4 3200 MHz DRAM (4 x 32GB) Corsair iCUE RGB 5000X mid tower case Noctua NH-D15 chromax.black CPU cooler Noctua NF-S12A chromax.black.swap case fans (Qty. 7) & Corsair LL-120 RGB Fans (Qty. 3)
    Keyboard
    Corsair K70 Max RGB Magnetic Keyboard
    Mouse
    Logitech MX Master 3
    Internet Speed
    1Gb Up / 1 Gb Down
    Browser
    Edge
    Antivirus
    Windows Defender
    Other Info
    The five 8TB drives and three 512GB SSDs are part of a DrivePool using StableBit DrivePool software. The three SSDs are devoted purely to caching for the 8TB drives. All of the important data is stored in triplicate so that I can withstand simultaneous failure of 2 disks.

    Networking: 2.5Gbps Ethernet and WiFi 6e
  • Operating System
    Win11 Pro 23H2
    Computer type
    Laptop
    Manufacturer/Model
    Lenovo ThinkBook 13x Gen 2
    CPU
    Intel i7-1255U
    Memory
    16 GB
    Graphics card(s)
    Intel Iris Xe Graphics
    Sound Card
    Realtek® ALC3306-CG codec
    Monitor(s) Displays
    13.3-inch IPS Display
    Screen Resolution
    WQXGA (2560 x 1600)
    Hard Drives
    2 TB 4 x 4 NVMe SSD
    PSU
    USB-C / Thunderbolt 4 Power / Charging
    Mouse
    Buttonless Glass Precision Touchpad
    Keyboard
    Backlit, spill resistant keyboard
    Internet Speed
    1Gb Up / 1Gb Down
    Browser
    Edge
    Antivirus
    Windows Defender
    Other Info
    WiFi 6e / Bluetooth 5.1 / Facial Recognition / Fingerprint Sensor / ToF (Time of Flight) Human Presence Sensor
I'll play with this again. It's been a long time since I played with this, but I was easily able to patch all my systems. I even scripted a lot of the steps. But that was probably a good year ago.

I'll post back once I update all my procedures based upon the latest info. It's low priority so it may be a couple days.
The current guidance is really strange in asking you to check event logs if your DB or DBX changes have taken effect. I found a PS function on GitHub which decodes the UEFI certificates list back into their normal names.

Not sure why MS doesn't just write a PS script like this one. Run the script to report which certs have already been installed.
 

Attachments

My Computer

System One

  • OS
    Windows 7
I'll play with this again. It's been a long time since I played with this, but I was easily able to patch all my systems. I even scripted a lot of the steps. But that was probably a good year ago.

I'll post back once I update all my procedures based upon the latest info. It's low priority so it may be a couple days.

Thank You Very Much!

The current guidance is really strange in asking you to check event logs if your DB or DBX changes have taken effect. I found a PS function on GitHub which decodes the UEFI certificates list back into their normal names.

Not sure why MS doesn't just write a PS script like this one. Run the script to report which certs have already been installed.

Code:
[B]PS C:\Windows\System32> powershell -NoExit -File Check_UEFI-DB.ps1[/B]

Windows PowerShell
Copyright (C) Microsoft Corporation. All rights reserved.

Try the new cross-platform PowerShell https://aka.ms/pscore6

Secure Boot: ENABLED

UEFI DB Certificates
--------------------
        Microsoft Corporation UEFI CA 2011
        Microsoft Windows Production PCA 2011

UEFI DBX Certificates
---------------------
        Microsoft Windows PCA 2010


PS C:\Windows\System32>
PS C:\Windows\System32> powershell -NoExit -File Check_UEFI-DB.ps1
Windows PowerShell
Copyright (C) Microsoft Corporation. All rights reserved.

Try the new cross-platform PowerShell https://aka.ms/pscore6

Secure Boot: ENABLED

UEFI DB Certificates
--------------------
        Microsoft Corporation UEFI CA 2011
        Microsoft Windows Production PCA 2011

UEFI DBX Certificates
---------------------
        Microsoft Windows PCA 2010


PS C:\Windows\System32>
I still have the original ones. I will try step 2 and 3 in a couple hours, right now I must leave the house.
 

My Computer

System One

  • OS
    Windows -10 22H2
    Computer type
    PC/Desktop
    Manufacturer/Model
    Dell Vostro 3671
    CPU
    intel 9xxx 6 core 3.6ghz
    Motherboard
    Dell Vostro 3671 OEM
    Memory
    16GB DDR4 2000MHZ
    Graphics Card(s)
    Integrated
    Sound Card
    integrated
    Monitor(s) Displays
    multi
    Screen Resolution
    4k 24"
    Hard Drives
    1TB PNY PCIx16 NVMe M.2
    700 GB Samsung HDD 2.5 (X2)
    500 GB WD SSD 2.5"
    PSU
    OEM 300 Watt
    Case
    OEM
    Cooling
    Dual Fan
    Keyboard
    Dell Wired keyboard
    Mouse
    Microsoft Wireless Optical
    Internet Speed
    10 Mb up / 100 Mb dn
    Browser
    Firefox ESR / Chrome
    Antivirus
    1-2 Apple / Day
@hsehestedt, I found an Enterprise KB which suggests you can run with scissors and collapse the 4 steps into only 3 reboots.

For information about how to apply Mitigation 1 and Mitigation 2 in two separate steps (if you want to be more cautious, at least at first) see KB5025885: How to manage the Windows boot manager revocations for Secure Boot changes associated with CVE-2023-24932. Or you can apply both mitigations by running the following single registry key operation as an administrator:

reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Secureboot /v AvailableUpdates /t REG_DWORD /d 0x140 /f

As the mitigations apply, the bits in the AvailableUpdates key will be cleared. After setting it to 0x140 and restarting, the value will change to 0x100 and then, after another restart, it will change to 0x000.

The boot manager mitigation will not be applied until the firmware indicates that the 2023 certificate mitigation is successfully applied. These operations cannot be performed out of order.

When both mitigations are applied, a registry key will be set to indicate that the system is “2023 capable”, meaning that the media can be updated and Mitigation 3 and Mitigation 4 can be applied.

In most cases, completing Mitigation 1 and Mitigation 2 requires at least two restarts before the mitigations are fully applied. Adding additional restarts in your environment will help ensure that the mitigations are applied sooner. However, it may not be practical to artificially inject additional restarts and may make sense to rely on the monthly restarts that occur as part of applying the security updates. Doing so means less disruption in your environment but at risk of taking longer to get secure.

After deploying Mitigation 1 and Mitigation 2 to your devices, you should monitor your devices to ensure that they have the mitigations applied and are now “2023 capable”. Monitoring can be done by looking for the following registry key on the system. If the key exists and is set to 1, then the system has added the 2023 certificate to the Secure Boot DB variable. If the key exists and is set to 2, then the system has the 2023 certificate in the DB and starts with the 2023 signed boot manager.


Registry Subkey HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecureBoot\Servicing
Key Value name WindowsUEFICA2023Capable
Data Type REG_DWORD
Data 0 – or key does not exist - “Windows UEFI CA 2023” certificate is not in the DB
1 - “Windows UEFI CA 2023” certificate is in the DB
2 - “Windows UEFI CA 2023” certificate is in the DB and the system is starting from the 2023 signed boot manager.

Important Mitigation 1 and Mitigation 2 must be completed before applying Mitigation 3 and Mitigation 4.

For information about how to apply Mitigation 3 and Mitigation 4 in two separate steps (if you want to be more cautious, at least at first) see KB5025885: How to manage the Windows boot manager revocations for Secure Boot changes associated with CVE-2023-24932 Or you can apply both mitigations by running the following single registry key operation as an Administrator:

reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Secureboot /v AvailableUpdates /t REG_DWORD /d 0x280 /f

Applying both mitigations together will only require one restart to complete the operation.


Bottom line, the whole manual process can be collapsed into:

1) reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Secureboot /v AvailableUpdates /t REG_DWORD /d 0x140 /f
2) shutdown /r /t 0

After 1st reboot

4) reg query HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Secureboot /v AvailableUpdates

If result = 100, then continue:
5) shutdown /r /t 0

After 2nd reboot

6) reg query HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Secureboot /v AvailableUpdates

If result = 0, then continue:
7) reg query HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecureBoot\Servicing /v WindowsUEFICA2023Capable

If result = 2, then continue:
8) reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Secureboot /v AvailableUpdates /t REG_DWORD /d 0x280 /f
9) shutdown /r /t 0

After 3rd reboot

10) powershell -C "[System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI dbx).bytes) -match 'Microsoft Windows Production PCA 2011'"

If result = $True, done!
 

My Computer

System One

  • OS
    Windows 7

Latest Support Threads

Back
Top Bottom