{"id":17779,"date":"2020-02-20T08:30:03","date_gmt":"2020-02-20T16:30:03","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2020\/02\/20\/news-11512\/"},"modified":"2020-02-20T08:30:03","modified_gmt":"2020-02-20T16:30:03","slug":"news-11512","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2020\/02\/20\/news-11512\/","title":{"rendered":"The mess behind Microsoft\u2019s yanked UEFI patch KB 4524244"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/09\/windows_patch_security10-100734740-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Thu, 20 Feb 2020 06:23:00 -0800<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Remember the warning about watching how sausage is made? This is an electronic sausage-making story with lots of dirty little bits.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">First, the chronology. On February\u2019s Patch Tuesday, Microsoft released a bizarre standalone security patch, KB 4524244, which was then called \u201cSecurity update for Windows 10, version 1607, 1703, 1709, 1803, 1809, and 1903: Feb. 11, 2020.\u201d The name has changed, but bear with me.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That patch had all sorts of weird hallmarks as I <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3526558\/patch-tuesday-99-holes-exploited-ie-fix-win7-mayhem-and-uefi-ghost.html\" rel=\"noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">discussed at the time<\/span><\/a><span style=\"font-weight: 400;\">:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Addresses an issue in which a third-party Unified Extensible Firmware Interface (UEFI) boot manager might expose UEFI-enabled computers to a security vulnerability.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That buggy patch was accompanied by a parallel patch for older versions of Windows, <\/span><a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4502496\/security-update-for-windows-10-version-1507-windows-8-1-rt-8-1-server\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">KB 4502496<\/span><\/a><span style=\"font-weight: 400;\">, called \u201cSecurity update for Windows 10, version 1507, Windows 8.1, RT 8.1, Server 2012 R2, and Server 2012: February 11, 2020.\u201d This time the name was correct. But the Win8.1\/1507 patch <\/span><a href=\"https:\/\/www.askwoody.com\/forums\/topic\/microsoft-pulls-kb-4524244-the-infamous-uefi-patch-from-the-catalog\/#post-2141303\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">had the same bugs<\/span><\/a><span style=\"font-weight: 400;\"> and met the same fate as its more illustrious co-conspirator, KB 4524244.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The patch wreaked havoc on many PCs, most notably HP PCs with Ryzen processors. HP owners with Secure Boot enabled (more about that later) reported that their PCs wouldn\u2019t reboot normally and, when forced, the HP BIOS said it<\/span><a href=\"https:\/\/www.reddit.com\/r\/Windows10\/comments\/f35o6i\/anyone_having_trouble_with_kb4524244_it_hangs_and\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\"> detected an unauthorized change to the secure boot keys and had to restore<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There\u2019s a second bug in the patches, identified separately in the <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/release-information\/status-windows-10-1909#392msgdesc\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">Windows Release Information status<\/span><\/a><span style=\"font-weight: 400;\"> page:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Using the \u201cReset this PC\u201d feature, also called \u201cPush Button Reset\u201d or PBR, might fail. You might restart into recovery with \u201cChoose an option\u201d at the top of the screen with various options or you might restart to your desktop and receive the error \u201cThere was a problem resetting your PC\u201d.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The files inside the patch were dated September 2019 \u2014 five months ago. As <\/span><a href=\"https:\/\/www.askwoody.com\/forums\/topic\/microsoft-pulls-kb-4524244-the-infamous-uefi-patch-from-the-catalog\/#post-2141134\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">@abbodi86 says on AskWoody<\/span><\/a><span style=\"font-weight: 400;\">:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The patch was first created in September 2019, so it was in testing for almost 5 months, and that still was not enough to get it right.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft has known about the UEFI loader security problem since April 2019, if not earlier. It took ten months to push a fix \u2014 and a buggy fix at that.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So what, really, was being patched in KB 4524244? The official description then, and even now, has very little substance.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It didn\u2019t take long for the <\/span><a href=\"https:\/\/twitter.com\/arekfurt\/status\/1228806929365045248\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">Twitterverse to point the finger<\/span><\/a><span style=\"font-weight: 400;\"> at Kaspersky as the source of the faulty UEFI boot manager, but why would Microsoft issue a separate Windows patch (actually, two patches) specifically to block Kaspersky&#8217;s product? And what had Kaspersky done to deserve such treatment?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That brings us to the sausage-making part of the story.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Kaspersky, like other antivirus companies, includes the ability to create a boot disk \u2014 in this case, the \u201cKaspersky Rescue Disk\u201d \u2014 that\u2019ll let you boot your computer even if your PC\u2019s internals have been compromised. In order to use the Kaspersky Rescue Disk, like other recovery boot disks, you have to have physical access to the PC.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The problem is that an older version of the Kaspersky Rescue Disk allowed attackers with physical access to your machine to boot the PC into a potentially harmful operating system, even if you have Secure Boot enabled. Secure Boot is supposed to make it impossible to use a recovery disk to boot into any operating system that hasn\u2019t been pre-approved, but this older version of the Kaspersky Rescue Disk didn\u2019t follow the Secure Boot rules.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Kaspersky learned of the security hole in April 2019, plugged it on systems running Kaspersky endpoint protection, but didn\u2019t release an update to the Kaspersky Rescue Disk until August 2019.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Compounding the problem is the fact that Microsoft signed the old Kaspersky Rescue Disk program, so Secure Boot continued to recognize old Kaspersky Rescue Disks as valid up until earlier this month. You can mince terminology, and argue that every antivirus manufacturer does it, but any way you slice it the Kaspersky Rescue Disk program is a rootkit or, more exactly, a bootkit.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If it sounds weird that Microsoft would sign a Kaspersky program \u2014 a rootkit routine, at that \u2014 it isn\u2019t. Russian blogger ValdikSS explained the conundrum in his April 2019 post &#8220;<\/span><a href=\"https:\/\/habr.com\/en\/post\/446238\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">Exploiting signed bootloaders to circumvent UEFI Secure Boot<\/span><\/a>&#8220;<span style=\"font-weight: 400;\">:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Modern PC motherboards&#8217; firmware follow UEFI specification since 2010. In 2013, a new technology called Secure Boot appeared, intended to prevent bootkits from being installed and run. Secure Boot prevents the execution of unsigned or untrusted program code (.efi programs and operating system boot loaders, additional hardware firmware like video card and network adapter OPROMs).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Secure Boot can be disabled on any retail motherboard, but a mandatory requirement for changing its state is physical presence of the user at the computer. It is necessary to enter UEFI settings when the computer boots, and only then it&#8217;s possible to change Secure Boot settings.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Most motherboards include only Microsoft keys as trusted, which forces bootable software vendors to ask Microsoft to sign their bootloaders. This process include code audit procedure and justification for the need to sign their file with globally trusted key if they want the disk or USB flash to work in Secure Boot mode without adding their key on each computer manually.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So Microsoft did, and does, quite intentionally, sign rootkits. Er, bootkits. That way, emergency restore disks can work.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft can change its mind about the security clearance of its Microsoft-approved UEFI bypass programs any time, but to do so it has to add the no-longer-trusted app to something called a <\/span><a href=\"https:\/\/uefi.org\/revocationlistfile\" rel=\"nofollow noopener\" target=\"_blank\">UEFI Revocation List File<\/a>,<span style=\"font-weight: 400;\"> which in turn updates the Secure Boot Forbidden Signature Database.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Still with me?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here\u2019s the problem. KB 4524244 and KB 4502496 add the old Kaspersky Rescue Disk routine to your PC\u2019s Secure Boot Forbidden Signature Database, so it won\u2019t be recognized as a Microsoft-approved app. But, for reasons that aren\u2019t at all clear, monkeying around with the UEFI Secure Boot restrictions broke other programs \u2014 most notably the boot routine for HP PCs with Ryzen processors. There may be other collateral damage. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Somebody at Microsoft may know what went belly-up, but they certainly aren\u2019t telling anybody.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Nothing. Other than distributing a Kaspersky Rescue Disk program, prior to August 2019, that could be used for nefarious purposes.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Kaspersky has a detailed \u2014 and, as far as I can tell, accurate \u2014 accounting of the debacle in a <\/span><a href=\"https:\/\/usa.kaspersky.com\/blog\/microsoft-kb4524244-issues-faq\/20319\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">newly released FAQ<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The key conclusion, \u201cKaspersky products have not been a cause of this issue,\u201d referring to the bugs in KB 4524244, rings true. The problem lies in some other conflict, which went unfixed in five months of testing.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It appears as if Microsoft had just tested its patch on an HP machine with a Ryzen processor we wouldn\u2019t be in this mess. But &#8230; Microsoft.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft has <\/span><a href=\"https:\/\/www.askwoody.com\/2020\/microsoft-pulls-kb-4524244-the-infamous-uefi-patch-from-the-catalog\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">yanked the patch<\/span><\/a><span style=\"font-weight: 400;\">. It won\u2019t be pushed onto your machine. You can\u2019t even download it from the Update Catalog.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you installed KB 4524244 or KB 4502496 on your PC (Start &gt; Settings &gt; Update &amp; Security, click View update history) and your machine still works, you\u2019re fine. The old Kaspersky Rescue Disk signature is in your Secure Boot Forbidden Signature Database, and you\u2019re no longer at risk from someone slipping a malicious disk into your machine.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you installed the update and your machine won\u2019t boot (yet another good reason to <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3402718\/the-case-against-knee-jerk-installation-of-windows-patches.html\" rel=\"noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">avoid installing patches right away<\/span><\/a><span style=\"font-weight: 400;\">, eh?), Microsoft has details for restoring your PC to health in the <\/span><a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4524244\/security-update-for-windows-10-february-11-2020\" rel=\"nofollow\"><span style=\"font-weight: 400;\">KB article<\/span><\/a><span style=\"font-weight: 400;\"> (which now mentions Win10 version 1909) and on the <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/release-information\/status-windows-10-1909#392msgdesc\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">Windows Release Information Status page<\/span><\/a><span style=\"font-weight: 400;\">. The instructions tell you how to uninstall the patch. For machines with the \u201cReset this PC\u201d bug, Microsoft also recommends that you follow the uninstall with a run of Reset this PC. I have no idea why uninstalling the patch and running Reset restores machines to a working state, but apparently it does.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you haven\u2019t yet installed the patch, be of good cheer. Microsoft will come up with a suitable fix at some point in the future. As both the KB article and the Release Information Page promise:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We are working on an improved version of this update in coordination with our partners and will release it in a future update.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Let\u2019s hope the \u201cimproved version\u201d works better than the old one \u2014 and that it takes less than ten months to respond to the problem. Meanwhile, ValdikSS <\/span><a href=\"https:\/\/twitter.com\/ValdikSS\/status\/1228249123700256768\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">warns in a tweet<\/span><\/a><span style=\"font-weight: 400;\">:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">At least 2 other vuln bootloaders exist, not revoked.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For joy.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As best I can tell, Microsoft hasn\u2019t published any details about this fiasco, other than yanking the patch, identifying the bugs and promising a fix. Security, meet obscurity.<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">Follow the play-by-play <\/span><\/i><a href=\"https:\/\/www.askwoody.com\/2020\/the-mess-behind-microsofts-yanked-uefi-patch-kb-4524244\/\" rel=\"nofollow noopener\" target=\"_blank\"><i><span style=\"font-weight: 400;\">on AskWoody.com<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">.<\/span><\/i><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3528302\/the-mess-behind-microsoft-s-yanked-uefi-patch-kb-4524244.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/09\/windows_patch_security10-100734740-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Thu, 20 Feb 2020 06:23:00 -0800<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p><span style=\"font-weight: 400;\">Remember the warning about watching how sausage is made? This is an electronic sausage-making story with lots of dirty little bits.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">First, the chronology. On February\u2019s Patch Tuesday, Microsoft released a bizarre standalone security patch, KB 4524244, which was then called \u201cSecurity update for Windows 10, version 1607, 1703, 1709, 1803, 1809, and 1903: Feb. 11, 2020.\u201d The name has changed, but bear with me.<\/span><\/p>\n<h2><strong>The original problems with KB 4524244<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">That patch had all sorts of weird hallmarks as I <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3526558\/patch-tuesday-99-holes-exploited-ie-fix-win7-mayhem-and-uefi-ghost.html\" rel=\"noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">discussed at the time<\/span><\/a><span style=\"font-weight: 400;\">:<\/span><\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3528302\/the-mess-behind-microsoft-s-yanked-uefi-patch-kb-4524244.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[10516,714,10525],"class_list":["post-17779","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-microsoft","tag-security","tag-windows"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17779","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17779"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17779\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17779"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17779"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17779"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}