PT-2025-20696 · Microsoft · Uefi +1
Published
2025-05-12
·
Updated
2025-08-30
·
CVE-2025-3052
8.2
High
Base vector | Vector | AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions:
Microsoft UEFI firmware versions prior to the fixed version
Description:
A vulnerability in Microsoft signed UEFI firmware allows for code execution of untrusted software, enabling attackers to control its value and leading to arbitrary memory writes, including modification of critical firmware settings stored in NVRAM. This could enable security bypasses, persistence mechanisms, or full system compromise. The vulnerability is related to the handling of the `IhisiParamBuffer` variable, which is stored in non-volatile memory. An attacker with admin rights can exploit this vulnerability to disable security and install bootkit malware.
Recommendations:
To resolve the issue, update the Microsoft UEFI firmware to the latest version that includes the fix for this vulnerability. Additionally, consider disabling the vulnerable UEFI module or restricting access to the `IhisiParamBuffer` variable until a patch is available. Apply patches now to safeguard systems, as Microsoft has patched the vulnerability in the June 2025 Patch Tuesday.
Fix
Untrusted Pointer Dereference
Weakness Enumeration
Related Identifiers
Affected Products
References · 74
- https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-3052 · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3052 · Security Note
- https://bdu.fstec.ru/vul/2025-06727 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-3052 · Security Note
- https://t.me/malwr/9606 · Telegram Post
- https://twitter.com/HivewireAI/status/1932514844487377186 · Twitter Post
- https://twitter.com/transilienceai/status/1933493447316680944 · Twitter Post
- https://twitter.com/SempreUpdate/status/1932740041551327474 · Twitter Post
- https://twitter.com/lnxsec/status/1940332137967648907 · Twitter Post
- https://t.me/true_secator/7123 · Telegram Post
- https://twitter.com/freedomhack101/status/1933142326802809142 · Twitter Post
- https://twitter.com/lnxsec/status/1943630135892066358 · Twitter Post
- https://twitter.com/grok/status/1951665151645765856 · Twitter Post
- https://twitter.com/transilienceai/status/1933310550722658377 · Twitter Post
- https://twitter.com/lnxsec/status/1942318975389499631 · Twitter Post