-
Notifications
You must be signed in to change notification settings - Fork 2.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Misinterpretation of the Secure Boot revocation alert of Rufus 4.6 #2617
Comments
Please do not ignore the issue checklist, especially:
|
If Rufus gave you a warning about the boot manager, its because the current Windows 10 ISO uses an older, vulnerable boot manager |
To add on @pineapple63's reply:
It is NOT telling you this at all. Instead it is telling you that, on a fully up to date system in terms of Secure Boot security, you may get a Security Violation when booting with Secure Boot enabled, on account that the bootloader has been revoked. ALL of the official Windows 10 retails ISOs have that issue because they all use a bootloader that is vulnerable to the BlackLotus vulnerability, and Microsoft has not released any updated ISOs for Windows 10 which means that they still use UEFI bootloaders from before when that vulnerability was discovered. The warning about Secure Boot revocation from Rufus were improved in version 4.6, but please make sure that you read them carefully and do not interpret them to mean something they aren't stating at all. |
So can I safely use that version, I disable secure boot and ignore the warning? |
Yes. Once Windows is installed with Secure Boot disabled, it will update its bootloaders to non-vulnerable versions and you can turn Secure Boot back on again. |
I didn't think that Windows automatically updated the bootloader to the CA 2023 certificate? The guidance at https://support.microsoft.com/en-us/topic/kb5025885-how-to-manage-the-windows-boot-manager-revocations-for-secure-boot-changes-associated-with-cve-2023-24932-41a975df-beb2-40c1-99a3-b3ff139f832d states that the date for the Enforcement Phase for permanent mitigation will be issued at a later date, so until then, if you want to install the CA 2023 cert to the secure boot database, sign the bootloader with the CA 2023 cert then add the CA 2011 cert to the UEFI Forbidden List, don't you have to perform these steps yourself as per this guidance? |
Yes. And Rufus does not yet warn about the revocation of the 2011 certificate enacted by following all the steps from KB5025885, otherwise, since Microsoft has not yet produced a single public ISO signed by anything else but the 2011 cert, every single Windows ISO would produce a warning. So, please be mindful that there are quite a few revocation conditions that Rufus will warn you about, and that despite what many people may think, Rufus does not yet warn about all the revocations it could warn you about, as we are also waiting for the date when enforcement will be mandatory. |
Hi, I downloader the Windows 10 ISO from the official website, but when I try to start the installation it tells me that the ISO may not be official. I checked the SHA code and it is the same instead with the 4.5p version the problem does not arise.
The text was updated successfully, but these errors were encountered: