Apologies for the late reply on this. The Secure Boot DBX update is a very complex thing to detect. The UEFI areas involved are not generally visible in a standard way, and requires running a probe action to detect whether the system is vulnerable / whether the update can be applied. The Task you… Answer from JasonWalker on forum.bigfix.com
🌐
Dell
dell.com › home › support home › knowledge base article
Windows Update KB5025885 Prevents Reinstallation of Microsoft Windows | Dell US
December 17, 2025 - Learn about the impact of KB5025885 on Windows Updates after May 09, 2023 that may prevent the booting of Microsoft Windows. Potential workarounds are also provided.
🌐
Microsoft Community Hub
techcommunity.microsoft.com › microsoft community hub › communities › products › windows › windows security
Applying the fix for KB5025885 (CVE-2023-24932) | Microsoft Community Hub
October 24, 2024 - In reference to this article: KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932 -...
🌐
Reddit
reddit.com › r/sysadmin › patch tuesday megathread (2024-02-13)
r/sysadmin on Reddit: Patch Tuesday Megathread (2024-02-13)
February 13, 2024 -

Hello r/sysadmin, I'm u/AutoModerator, and welcome to this month's Patch Megathread!

This is the (mostly) safe location to talk about the latest patches, updates, and releases. We put this thread into place to help gather all the information about this month's updates: What is fixed, what broke, what got released and should have been caught in QA, etc. We do this both to keep clutter out of the subreddit, and provide you, the dear reader, a singular resource to read.

For those of you who wish to review prior Megathreads, you can do so here.

While this thread is timed to coincide with Microsoft's Patch Tuesday, feel free to discuss any patches, updates, and releases, regardless of the company or product. NOTE: This thread is usually posted before the release of Microsoft's updates, which are scheduled to come out at 5:00PM UTC.

Remember the rules of safe patching:

  • Deploy to a test/dev environment before prod.

  • Deploy to a pilot/test group before the whole org.

  • Have a plan to roll back if something doesn't work.

  • Test, test, and test!

🌐
2pintsoftware
2pintsoftware.com › news › details › kb5025885-and-boot-wims
KB5025885 and Boot WIMs
April 19, 2024 - However, the community rocks and Gary Blok has already published some blogs on automating these steps for testing purposes (see ConfigMgrTask Sequence – KB5025885: How to manage the Windows Boot Manager revocationsfor Secure Boot changes associated with CVE-2023-24932 – GARYTOWN ConfigMgrBlog).
🌐
Broadcom
knowledge.broadcom.com › external › article › 376890 › machines-may-be-unable-to-apply-system-u.html
Machines may be unable to apply system UEFI update KB5025885 with Symantec Encryption
September 11, 2024 - Windows systems may not be able to apply a specific system update (KB5025885) that will update the UEFI system to accommodate a Microsoft update.
🌐
Reddit
reddit.com › r/sysadmin › applying the fix for kb5025885 (cve-2023-24932)
r/sysadmin on Reddit: Applying the fix for KB5025885 (CVE-2023-24932)
November 13, 2024 -

https://support.microsoft.com/en-us/topic/kb5025885-how-to-manage-the-windows-boot-manager-revocations-for-secure-boot-changes-associated-with-cve-2023-24932-41a975df-beb2-40c1-99a3-b3ff139f832d

The fix outlined in the above article no longer works. I used to have a series of scripts that made the registry changes and ran the verification checks. Those scripts no longer work; however, previously fixed machines still report as fixed. Today, I decided to run the steps as listed (and to not use my scripts). For instance, Step 1b still returns "False".

In addition, the machines in question...

  • Have at least the 2024-10 Cumulative Update (newer than is required).

  • Are Secure Boot enabled.

  • Are rebooted twice before proceeding to the next step. (AvailableUpdates key resets to 0, which is expected.)

I posted something similar over in MS Tech Community a couple weeks ago but haven't gotten a response.

🌐
My Abandonware
myabandonware.com › game › microshaft-winblows-98-3n2
Download Microshaft Winblows 98 - My Abandonware
1998, the year Microshaft Winblows 98 was released on Windows, as well as Mac. Made by Parroty Interactive, WayForward Technologies, Inc. and published by Palladium Interactive, Inc., this action and strategy game is available for free on this page.
Find elsewhere
🌐
Urban Dictionary
urbandictionary.com › define.php
Urban Dictionary: Microshaft
November 13, 2003 - Microshaft: Buying a Microsoft product and getting the "shaft"
🌐
Reddit
reddit.com › r/sccm › kb5025885 - windows boot manager changes - enforcement
r/SCCM on Reddit: KB5025885 - Windows Boot Manager Changes - ENFORCEMENT
October 14, 2024 -

Hi all,

Anyone else seeing this potentially be turned on in their environment?

Long story short, I had a tech reach out to me a week or so ago, about a Lenovo that would not take Windows 10. Kept saying the boot media was/imaging stick (traditional imaging, OSD) was not working. Had him rebuild his stick. Try again. Reset BIOS defaults (we image 100s of a machines a week, and it's generally 'your stick is bad' sort of thing; this tech is not dumb). I pulled out the same model he was using (a Lenovo P52s), tried Windows 10, worked fine.

Next day, went to re-image the same Lenovo box. It wouldn't boot with my stick. I frowned. My mind started pondering.

Re-imaged another box with Windows 10. Let it sit for awhile. Try again; USB stick didn't work.

Shit.

So, long story short, I update our OSD process with the 'latest monthly patch' each month, so that gets installed as an LSU/update during the TS. What I was seeing is the 'enforcement' phase of KB5025885... "turn on". Which... wasn't great.

Follow Gary's instructions here, I whipped up a new media with refreshed files, after 'fully and intentionally enabling it' on a laptop.

KB5025885 – Updating your USB Boot Media – Leveraging OSD Module – GARYTOWN ConfigMgr Blog

Copied the files over, and voila, works fine now, on the 'broken' devices.

So:

  1. I have heard no one else mention this.

  2. I may be insane.

  3. I may have done something wrong, but I 100% did not INTENTIONALLY enable the remediation steps yet, especially during OSD and 'randomly'.

  4. I saw this KB5036534: Latest Windows hardening guidance and key dates - Microsoft Support: Which specifically says:

October 2024 or later

  • Secure Boot bypass protections KB5025885 | Phase 3 Mandatory Enforcement phase. The revocations (Code Integrity Boot policy and Secure Boot disallow list) will be programmatically enforced after installing updates for Windows to all affected systems with no option to be disabled.

Is anyone else seeing their fully patched October 2024 devices turn these settings on, and can no longer be imaged with their 'non remediated' sticks?

I'm not talking about the *FIRST* patch, but rather the *second* phase, the steps that Gary's blog post outlines; modifying the files on the boot media itself, not *just* patching the boot.wim.

I feel like I'm taking crazy pills, so just needed to post this.

🌐
Reddit
reddit.com › r/sysadmin › kb5025885 secure boot issues
Problèmes de démarrage sécurisé KB5025885 : r/sysadmin
August 16, 2024 -

I've gone ahead with Microsoft's recommendations for KB5025885 and have implemented these Secure Boot revocations on a few physical servers. Before doing this I verified I could get recovery partitions and bootable USBs to still work after changing the trusted SB certificates. This worked like Microsoft said it would.

However, time came to actually reinstall Windows Server on a couple machines that have these revocations applied and it is going horribly. The install USBs work after updating the boot files on the USBs, but the Windows install the USB creates fails Secure Boot... it is still signed with their revoked 2011 certificate. What is the point of updating installation media if the Windows install it creates isn't updated and won't boot with Secure Boot enabled?

I've tried placing Secure Boot in Audit mode, where the system will boot, but Microsoft's steps to update the boot EFI files fail. This process hasn't failed on any other systems I've done it on, not sure why it's failing here, but maybe it has to do with Audit mode being enabled.

Anyway, I'm in a pickle with this. Things seemed like they were fine and Microsoft's instructions (while needlessly complicated over 1 year in) worked. But it seems there is a huge hole left in their documentation, which they implied wasn't there. If you know how to get a bootable fresh install after applying KB5025885, please let me know!

🌐
Internet Archive
archive.org › software
Microshaft Winblows 98 : Parroty Interactive : Free Download, Borrow, and Streaming : Internet Archive
March 1, 2015 - Microshaft Winblows 98 is a spoof on the Microsoft Windows 98 operating system. It is a collection of small games and other interactive activities that spoof both Microsoft, Windows and Bill Gates.
🌐
Commvault Community
community.commvault.com › commvault cloud topics › self-hosted q&a › 1-touch recovery and microsoft secure boot changes
1-touch recovery and Microsoft Secure boot changes | Community
May 12, 2023 - Microsoft is implementing changes to the Windows Boot manager in May 2023 updates. Will there be an updated version of 1-touch recovery media available for this?https://support.microsoft.com/en-us/topic/kb5025885-how-to-manage-the-windows-boot-manager-revocations-for-secure-boot-changes-associated-w...
🌐
Wikipedia
en.wikipedia.org › wiki › Microshaft_Winblows_98
Microshaft Winblows 98 - Wikipedia
2 weeks ago - Microshaft Winblows 98 is a 1998 interactive comedy video game for Windows and Classic Mac OS. It parodies the then-upcoming Windows 98 operating system, as well as Microsoft co-founder Bill Gates.
🌐
Microsoft Learn
learn.microsoft.com › en-us › answers › questions › 3943828 › adk-version-adk-10-1-26100-1-(may-2024)-and-kb5025
ADK version ADK 10.1.26100.1 (May 2024) and KB5025885 - Microsoft Q&A
Normally it is required as KB5025885 is primarily used to address important changes related to the Windows Startup Manager undoing secure boot due to the security vulnerability CVE-2023-24932.
🌐
IMDb
imdb.com › title › tt2690398
Microshaft Winblows 98 (Video Game 1998) ⭐ 3.6 | Comedy
January 30, 1998 - With Tamara Bick, J.P. Manoux, Joe Alaskey, Brian Benson. Microshaft's disgruntled employees Meg and Graham let you preview the company's secret OS. Play mini-games involving Bill Gates and Steve Jobs, watch parodies of Star Trek: TNG, Baywatch ...
Rating: 3.6/10 ​ - ​ 14 votes
🌐
Getac
support.getac.com › Portal › NewsDetail
Getac Technology Corporation Statement on Microsoft
June 9, 2023 - Since the Secure Boot security feature has been bypassed by the BlackLotus UEFI bootkit, which is tracked under CVE-2023-24932, Microsoft took action by releasing KB5025885 and security updates on May 9th, 2023, to manage the Windows Boot Manager revocations.
🌐
Microsoft Learn
learn.microsoft.com › en-gb › answers › questions › 1346149 › applying-kb5025885
Applying KB5025885 - Microsoft Q&A
August 15, 2023 - Hi, I'm just after some advice and opinions on how best to deploy this. We have a Windows 10 and 11 estate for desktops, all of which have the appropriate updates installed. We also have a mostly Server 2019 estate which is similarly updated. My…