Hello r/sysadmin, I'm u/AutoModerator, and welcome to this month's Patch Megathread!
This is the (mostly) safe location to talk about the latest patches, updates, and releases. We put this thread into place to help gather all the information about this month's updates: What is fixed, what broke, what got released and should have been caught in QA, etc. We do this both to keep clutter out of the subreddit, and provide you, the dear reader, a singular resource to read.
For those of you who wish to review prior Megathreads, you can do so here.
While this thread is timed to coincide with Microsoft's Patch Tuesday, feel free to discuss any patches, updates, and releases, regardless of the company or product. NOTE: This thread is usually posted before the release of Microsoft's updates, which are scheduled to come out at 5:00PM UTC.
Remember the rules of safe patching:
-
Deploy to a test/dev environment before prod.
-
Deploy to a pilot/test group before the whole org.
-
Have a plan to roll back if something doesn't work.
-
Test, test, and test!
Videos
I've gone ahead with Microsoft's recommendations for KB5025885 and have implemented these Secure Boot revocations on a few physical servers. Before doing this I verified I could get recovery partitions and bootable USBs to still work after changing the trusted SB certificates. This worked like Microsoft said it would.
However, time came to actually reinstall Windows Server on a couple machines that have these revocations applied and it is going horribly. The install USBs work after updating the boot files on the USBs, but the Windows install the USB creates fails Secure Boot... it is still signed with their revoked 2011 certificate. What is the point of updating installation media if the Windows install it creates isn't updated and won't boot with Secure Boot enabled?
I've tried placing Secure Boot in Audit mode, where the system will boot, but Microsoft's steps to update the boot EFI files fail. This process hasn't failed on any other systems I've done it on, not sure why it's failing here, but maybe it has to do with Audit mode being enabled.
Anyway, I'm in a pickle with this. Things seemed like they were fine and Microsoft's instructions (while needlessly complicated over 1 year in) worked. But it seems there is a huge hole left in their documentation, which they implied wasn't there. If you know how to get a bootable fresh install after applying KB5025885, please let me know!
https://support.microsoft.com/en-us/topic/kb5025885-how-to-manage-the-windows-boot-manager-revocations-for-secure-boot-changes-associated-with-cve-2023-24932-41a975df-beb2-40c1-99a3-b3ff139f832d
The fix outlined in the above article no longer works. I used to have a series of scripts that made the registry changes and ran the verification checks. Those scripts no longer work; however, previously fixed machines still report as fixed. Today, I decided to run the steps as listed (and to not use my scripts). For instance, Step 1b still returns "False".
In addition, the machines in question...
Have at least the 2024-10 Cumulative Update (newer than is required).
Are Secure Boot enabled.
Are rebooted twice before proceeding to the next step. (AvailableUpdates key resets to 0, which is expected.)
I posted something similar over in MS Tech Community a couple weeks ago but haven't gotten a response.
I've been worrying a lot about this, and I feel there are shockingly few posts here and in other places for something that feels like a major undertaking to me, that is patching for and mitigating the BlackLotus vulnerability:
https://support.microsoft.com/en-us/topic/kb5025885-how-to-manage-the-windows-boot-manager-revocations-for-secure-boot-changes-associated-with-cve-2023-24932-41a975df-beb2-40c1-99a3-b3ff139f832d#:~:text=IMPORTANT%20You%20should%20apply%20the,by%20the%20BlackLotus%20UEFI%20bootkit.
My biggest concern, at the yet unannounced enforcement date, will all Windows computers utilizing UEFI/Secure Boot cease booting if the mitigations are not applied? It sounds like once enforcement comes, the old 2011 UEFI cert will be revoked universally.
If that is the case, will all Windows computers need to go through all of the mitigation steps and reboots? Are there any plans for a streamlined/automated fix from Microsoft?
Hoping to hear insights from others who have looked into this. Thanks!