Windows 8 Secure Boot bypass via “Setup” variable in vulnerable system firmware

Video is ready, Click Here to View ×

Proof-of-concept user-mode attack bypassing Windows 8 Secure Boot possible by exploiting vulnerable UEFI firmware implementations on a system that store Secure Boot configuration settings unprotected in EFI variable “Setup”.

Details were presented at CanSecWest 2014 by researchers from Intel ATR ( and MITRE (

Be the first to comment

Leave a Reply

Your email address will not be published.