Saturday, March 29, 2025
HomeCVE/vulnerabilityClevo Devices Vulnerable as Boot Guard Private Key Leaks via Firmware Updates

Clevo Devices Vulnerable as Boot Guard Private Key Leaks via Firmware Updates

Published on

SIEM as a Service

Follow Us on Google News

A recent investigation has revealed that several Clevo-based devices are vulnerable due to a leak of Boot Guard private keys.

This vulnerability was first reported on the Win-Raid forum and involves firmware updates containing sensitive Boot Guard Key Manifest (KM) and Boot Policy Manifest (BPM) private keys.

Boot Guard is a security technology used by Intel to ensure that only authorized firmware is executed during system boot, preventing unauthorized code from running.

The discovery of Boot Guard private keys used in Clevo devices on the Win-Raid forum.
The discovery of Boot Guard private keys used in Clevo devices on the Win-Raid forum.

However, if the private keys associated with this technology are leaked, attackers can use them to sign malicious firmware images that bypass Boot Guard’s security checks.

Investigation Details

The Binarly Research team, known for their work in uncovering UEFI ecosystem vulnerabilities, was alerted to the issue after a post on the Win-Raid forum detailed the discovery of Boot Guard key manifests in firmware updates for Clevo devices.

Upon investigation, the team confirmed that two private keys were embedded within the BootGuardKey.exe binary and standalone files.

UEFITool showing the BootGuard Key Manifest embedded in a Clevo firmware image
UEFITool showing the BootGuard Key Manifest embedded in a Clevo firmware image

These keys matched the modules used in a Clevo firmware image, effectively allowing malicious firmware to bypass Boot Guard validation.

To understand the extent of this vulnerability, Binarly integrated the leaked keys into their Transparency Platform for an ecosystem-wide scan.

The results were surprising, revealing 15 firmware images across 10 unique devices that used these compromised keys. Notably, these devices included recently released models like the Gigabyte G6X 9KG from 2025.

While the leak does not appear to affect other major vendors, the potential reach is significant due to Clevo’s role as an original design manufacturer (ODM) for several brands.

Affected Devices

The following devices have firmware images containing the leaked keys:

  • XPG Xenia 15G G2303_V1.0.8 (Clevo, Insyde)
  • Gigabyte G5 KE (Clevo, Insyde)
  • Gigabyte G5 KF 2024 (Clevo, Insyde)
  • Gigabyte G5 KF5 2024 (Clevo, Insyde)
  • Gigabyte G5 ME (Clevo, Insyde)
  • Gigabyte G6 KF (Clevo, Insyde)
  • Gigabyte G6X 9KG 2024 (Clevo, Insyde)
  • Gigabyte G7 KF (Clevo, Insyde)
  • Notebook System Firmware 1.07.07TRO1 (Clevo, Insyde)

Binarly reported the vulnerability to CERT/CC on February 28, 2025, but the case was closed shortly after without a detailed explanation.

affected by this Boot Guard private key leak
affected by this Boot Guard private key leak

The leak highlights the interconnected risks within the UEFI ecosystem, where a single key compromise can affect multiple devices across different vendors.

Recommendations

  • Users of affected devices should monitor for firmware updates that address this vulnerability.
  • Manufacturers should conduct thorough security audits to prevent similar leaks in the future.
  • The broader UEFI community should remain vigilant for signs of compromised security keys and collaborate to strengthen security standards.

The leak of Boot Guard private keys in Clevo firmware updates presents a significant security risk, underscoring the need for robust security practices across the entire UEFI ecosystem.

Are you from SOC/DFIR Teams? – Analyse Malware, Phishing Incidents & get live Access with ANY.RUN -> Start Now for Free. 

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

SquareX Discloses Browser-Native Ransomware that Puts Millions at Risk

From WannaCry to the MGM Resorts Hack, ransomware remains one of the most damaging...

Hackers Exploit DNS MX Records to Create Fake Logins Imitating 100+ Brands

Cybersecurity researchers have discovered a sophisticated phishing-as-a-service (PhaaS) platform, dubbed "Morphing Meerkat," that leverages...

New Python-Based Discord RAT Targets Users to Steal Login Credentials

A recently identified Remote Access Trojan (RAT) has raised alarms within the cybersecurity community...

PJobRAT Android Malware Masquerades as Dating and Messaging Apps to Target Military Personnel

PJobRAT, an Android Remote Access Trojan (RAT) first identified in 2019, has resurfaced in...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hackers Exploit DNS MX Records to Create Fake Logins Imitating 100+ Brands

Cybersecurity researchers have discovered a sophisticated phishing-as-a-service (PhaaS) platform, dubbed "Morphing Meerkat," that leverages...

New Python-Based Discord RAT Targets Users to Steal Login Credentials

A recently identified Remote Access Trojan (RAT) has raised alarms within the cybersecurity community...

PJobRAT Android Malware Masquerades as Dating and Messaging Apps to Target Military Personnel

PJobRAT, an Android Remote Access Trojan (RAT) first identified in 2019, has resurfaced in...