Microsoft reports several bootloader vulnerabilities

microsoft.com

85 points by hacknslack 4 days ago


fuzzfactor - 4 hours ago

Well if Microsoft was as serious about security as they could be, they would have made sure the NT6 boot routine would boot Linux without needing Grub a long time ago.

With the resources they have, and these unique findings AI has helped them discover, they should now be in the ideal position to rapidly correct this deficiency in their own bootloader, so that nobody will ever need to use Grub again.

With this level of expertise, now enhanced by AI, and so much effort already behind them so far, it shouldn't take much to push this over the finish line, provided they have an effective enough organization when it comes to enhancing the security of PC users overall. After all, they don't even have to worry about addressing Macs.

I know the engineers are brilliant enough by far, and with nothing holding them back, we should be able to expect a minor revision of of the NT bootloader like this to be arriving any day now.

According to what I see in the article, this would be one of the most timely & useful security patches to show up on Windows Update, I hope they don't drop the ball on this one.

Patch Tuesday is next week but they seem so close they could probably push this critical correction out before that, so watch for it :)

zelon88 - 4 hours ago

"To demonstrate how efficient our product, CoPilot is, we've decided to use it to uncover vulnerabilities in competing products."

Gee, how clever and thoughtful.

usr1106 - 13 hours ago

That grub has security vulnerabities does not surprise me, it's just too big. That's why Lennart recommends systemd-boot. (Incidently a Microsoft employee, but I have no information that he would have been involved in these discoveries.) U-boot again is typical embedded software, a field generally known more for hacks than strict programming practices. So I cannot say I would be shocked. That said, I would be surprised if systemd-boot or Microsoft's loader had zero vulnerabilities hiding somewhere.

When does Microsoft open their source for searching vulnerabilities?

greatgib - 12 hours ago

To start with, security of "secure boot" there is a joke because anyway all os have to be signed by Microsoft itself. So anyone with they certificate key can do whatever they want.

And btw, not that long ago it was released by researchers than more than 200 platforms from diverse but main laptops and servers manufacturers were still using leaked keys for signing their boot loaders...

aaronmdjones - 14 hours ago

The link for U-Boot CVE-2025-26729 is actually 2 separate links that lead to different vulnerabilities depending on which half of it you click.

Odd. I wonder if the article was written by AI.

moktonar - 4 hours ago

What they probably don’t tell you is that they also found critical vulnerabilities in their own boot loader and fixed them silently

gnabgib - 16 hours ago

Title: Analyzing open-source bootloaders: Finding vulnerabilities faster with AI

ncr100 - 4 days ago

Nice to see Microsoft boosting open source operating system practices. (May be a little anti monopoly politicking, ahem.)

Makes me trust open source operating systems more!

- 4 days ago
[deleted]
userbinator - 17 hours ago

[flagged]

jonathanstrange - 11 hours ago

I consider the ability to bypass secure boot a feature, not a bug.

neuroelectron - 13 hours ago

if you want to security, I think a generic boot loader isn't really a realistic target. A boot loader should be specific to the hardware. If you want a generic boot loader, you need to integrate perfected boot loaders for each hardware.