Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

CISA Releases Guidance for Managing UEFI Secure Boot on Enterprise Devices

Posted on December 15, 2025December 15, 2025 By CWS

The U.S. Cybersecurity and Infrastructure Safety Company (CISA), in coordination with the Nationwide Safety Company (NSA), has issued new steerage urging enterprises to confirm and handle UEFI Safe Boot configurations to counter bootkit threats.

Launched in December 2025 as a Cybersecurity Data Sheet (CSI), the doc addresses vulnerabilities like PKFail, BlackLotus, and BootHole that bypass boot-time protections. Enterprises neglecting these checks face heightened dangers from persistent firmware malware.​

UEFI Safe Boot, launched in 2006, enforces boot insurance policies utilizing certificates and hashes in 4 variables: Platform Key (PK), Key Trade Key (KEK), allowed database (DB), and revocation database (DBX).

It prevents unsigned boot binaries, mitigating provide chain dangers through the transition from expiring 2011 Microsoft certificates to 2023 variations. Whereas default settings on most gadgets block unknown malware, misconfigurations usually from take a look at keys or disabled modes, expose techniques.

Highlighted Vulnerabilities

PKFail concerned gadgets shipped with untrusted take a look at certificates, enabling Safe Boot bypasses. BlackLotus (CVE-2023-24932) exploited bootloader flaws to disable enforcement regardless of standing indicators displaying it was energetic.

BootHole flaws in GRUB allowed arbitrary execution by way of malformed configs, overwhelming DBX reminiscence on older {hardware}. These incidents underscore the necessity for routine audits past TPM or BitLocker reliance.

Directors ought to first affirm enforcement: Home windows customers run Affirm-SecureBootUEFI in PowerShell (True signifies energetic); Linux customers use sudo mokutil –sb-state.

Export variables with Get-SecureBootUEFI or efi-readvar, then analyze utilizing NSA’s GitHub instruments for certs/hashes. Anticipated setups characteristic system vendor PK/KEK, Microsoft 2011/2023 CAs in DB, and DBX hashes no take a look at keys or permissive modes.

ComponentExpected Configuration Improper Indicators PKSystem vendor certificateAbsent or take a look at keysKEKVendor + Microsoft 2011/2023Missing Microsoft KEKsDBMicrosoft CAs + vendorEmpty or misplaced certsDBXRevocation hashesBoot hashes or duplicates

Restore by way of UEFI setup to manufacturing facility defaults or apply firmware/OS updates delivering capsules. For enterprises, combine checks into procurement testing and SCRM processes.

NSA advises customization over disabling for stricter controls, with instruments on GitHub. The steerage stresses full auditing modes and avoiding the Compatibility Help Module (CSM).

This CSI equips IT groups to safeguard boot integrity amid evolving threats. Obtain the total PDF from official sources for instructions and diagrams​.

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Boot, CISA, Devices, Enterprise, Guidance, Managing, Releases, Secure, UEFI

Post navigation

Previous Post: Cybersecurity News Weekly Newsletter – Windows, Chrome, and Apple 0-days, Kali Linux 2025.4, and MITRE Top 25
Next Post: VolkLocker Ransomware Exposed by Hard-Coded Master Key Allowing Free Decryption

Related Posts

New EDR-Freeze Tool That Puts EDRs And Antivirus Into A Coma State Cyber Security News
SparkKitty Attacks iOS and Android Devices in Wild Via App Store and Google Play Cyber Security News
Rockwell ControlLogix Ethernet Vulnerability Let Attackers Execute Remote Code Cyber Security News
Hackers Weaponizing Free Trials of EDR to Disable Existing EDR Protections Cyber Security News
Microsoft Defender for Office 365 New Dashboard to Provide More Details Across a Range of Threat Vectors Cyber Security News
AWS US-EAST-1 Region Experiences Delays in EC2 Instance Deployments Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • In Other News: Paid for Being Jailed, Google’s $68M Settlement, CISA Chief’s ChatGPT Leak
  • UAT-8099 Targets Vulnerable IIS Servers Using Web Shells, PowerShell, and Region-Customized BadIIS
  • Aisy Launches Out of Stealth to Transform Vulnerability Management
  • 175,000 Exposed Ollama Hosts Could Enable LLM Abuse
  • TAMECAT PowerShell-Based Backdoor Exfiltrates Login Credentials from Microsoft Edge and Chrome

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • In Other News: Paid for Being Jailed, Google’s $68M Settlement, CISA Chief’s ChatGPT Leak
  • UAT-8099 Targets Vulnerable IIS Servers Using Web Shells, PowerShell, and Region-Customized BadIIS
  • Aisy Launches Out of Stealth to Transform Vulnerability Management
  • 175,000 Exposed Ollama Hosts Could Enable LLM Abuse
  • TAMECAT PowerShell-Based Backdoor Exfiltrates Login Credentials from Microsoft Edge and Chrome

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark