Forum Discussion
CVE 2022 41099
Have you seen these pages? Lots of interesting detail and debate, and some scripts that may work.
https://www.reddit.com/r/sysadmin/comments/10a1enh/how_are_you_updating_winre_to_address_cve202241099/
https://www.elevenforum.com/t/important-issue-to-be-aware-of-if-you-use-bitlocker-on-your-os-drive.11818/page-2#post-244851
PeterRising,
Yes Peter - i know them all searching for answers.
There's two issues:
1st - how to patch WinRE - this is something i can handle. There's also a script on github going a different way and copying a patched wim-file to replace the unpatched version directly in the partition. But this all is not a solution as if am able to replace the wim directly everybody can extract the unpatched version out of any iso image in any version.
2nd - if this is the problem i can see, this is a high Risk in my risk table and if i go through all the options i can no longer trust bitlocker!
To say something about this risk i'd need info about the attack itself. Without, i can not make any trustworthy comment. If the issue is build into the wim, there's no way to prevent one to mount this wim on a separate disk, boot the computer and use it to crack bitlocker. So neither disabling the WinRE nor deleting it from the HD will be a solution.
If this becomes true, we have a really big problem with nearly every windows computer.
I hope microsoft will give info about the attack itself. If not we can only "guess" and in this case my reaction as CISO would be to disable any Bitlocker and replace it with a differens solution.
Non encrypted disks on a computer is no way ...
- hipsluJan 17, 2023Copper Contributorin my understanding, blocking booting from external media and requiring a pin (pre boot auth) would be needed to be on the safe side again - what do you think?
- GKrembslerJan 17, 2023Copper ContributorHello hipslu,
i do not think this is a solution.
The attacker needs to have physical access to the computer. If so i'd take the "HDD" and put it into a different system.
There i can do whatever needed. So none of you suggestions would be a handicap for me 😉
But - maybe if there's something in the way the attack is working. for example if we need to have access to the machines TPM - it would be a different picture.
At the moment i can only hope that we will become information so it is possible to calculate the risk and find a solution.- hipsluJan 17, 2023Copper Contributorhi GKrembsler,
since the key is stored in tpm, taking out the hdd would not help much - this is no risk imho