Cyber Security News

Clevo Devices Vulnerable as Boot Guard Private Key Leaks via Firmware Updates

A recent investigation has revealed that several Clevo-based devices are vulnerable due to a leak of Boot Guard private keys.

This vulnerability was first reported on the Win-Raid forum and involves firmware updates containing sensitive Boot Guard Key Manifest (KM) and Boot Policy Manifest (BPM) private keys.

Boot Guard is a security technology used by Intel to ensure that only authorized firmware is executed during system boot, preventing unauthorized code from running.

The discovery of Boot Guard private keys used in Clevo devices on the Win-Raid forum.The discovery of Boot Guard private keys used in Clevo devices on the Win-Raid forum.
The discovery of Boot Guard private keys used in Clevo devices on the Win-Raid forum.

However, if the private keys associated with this technology are leaked, attackers can use them to sign malicious firmware images that bypass Boot Guard’s security checks.

Investigation Details

The Binarly Research team, known for their work in uncovering UEFI ecosystem vulnerabilities, was alerted to the issue after a post on the Win-Raid forum detailed the discovery of Boot Guard key manifests in firmware updates for Clevo devices.

Upon investigation, the team confirmed that two private keys were embedded within the BootGuardKey.exe binary and standalone files.

UEFITool showing the BootGuard Key Manifest embedded in a Clevo firmware image

These keys matched the modules used in a Clevo firmware image, effectively allowing malicious firmware to bypass Boot Guard validation.

To understand the extent of this vulnerability, Binarly integrated the leaked keys into their Transparency Platform for an ecosystem-wide scan.

The results were surprising, revealing 15 firmware images across 10 unique devices that used these compromised keys. Notably, these devices included recently released models like the Gigabyte G6X 9KG from 2025.

While the leak does not appear to affect other major vendors, the potential reach is significant due to Clevo’s role as an original design manufacturer (ODM) for several brands.

Affected Devices

The following devices have firmware images containing the leaked keys:

  • XPG Xenia 15G G2303_V1.0.8 (Clevo, Insyde)
  • Gigabyte G5 KE (Clevo, Insyde)
  • Gigabyte G5 KF 2024 (Clevo, Insyde)
  • Gigabyte G5 KF5 2024 (Clevo, Insyde)
  • Gigabyte G5 ME (Clevo, Insyde)
  • Gigabyte G6 KF (Clevo, Insyde)
  • Gigabyte G6X 9KG 2024 (Clevo, Insyde)
  • Gigabyte G7 KF (Clevo, Insyde)
  • Notebook System Firmware 1.07.07TRO1 (Clevo, Insyde)

Binarly reported the vulnerability to CERT/CC on February 28, 2025, but the case was closed shortly after without a detailed explanation.

affected by this Boot Guard private key leak

The leak highlights the interconnected risks within the UEFI ecosystem, where a single key compromise can affect multiple devices across different vendors.

Recommendations

  • Users of affected devices should monitor for firmware updates that address this vulnerability.
  • Manufacturers should conduct thorough security audits to prevent similar leaks in the future.
  • The broader UEFI community should remain vigilant for signs of compromised security keys and collaborate to strengthen security standards.

The leak of Boot Guard private keys in Clevo firmware updates presents a significant security risk, underscoring the need for robust security practices across the entire UEFI ecosystem.

Are you from SOC/DFIR Teams? – Analyse Malware, Phishing Incidents & get live Access with ANY.RUN -> Start Now for Free. 

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

CISA Warns of RESURGE Malware Exploiting Ivanti Connect Secure RCE Vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a detailed Malware Analysis Report (MAR-25993211-r1.v1)…

4 minutes ago

Chinese Lotus Blossom Hackers leverages Windows Management Instrumentation for Network Movement

The Chinese Advanced Persistent Threat (APT) group known as Lotus Blossom, also referred to as…

8 minutes ago

Canon Printer Vulnerability Allows Attackers to Execute Arbitrary Code

A security vulnerability, tracked as CVE-2025-1268, has been found in certain Canon printer drivers, potentially allowing…

2 hours ago

Mitel Alerts Users to Severe XSS Vulnerability in MiContact Center

Mitel has issued a security advisory (MISA-2025-0003) to notify users of its MiContact Center Business…

2 hours ago

ClickFix Captcha – A New Technique Hackers Used to Deliver Infostealers, Ransomware, & Quakbot Malware

Cybercriminals are leveraging fake CAPTCHA verification pages dubbed ClickFix to distribute malware, including infostealers, ransomware,…

2 hours ago

Multiple Dell Unity Vulnerabilities Allow Attackers to Compromise Systems

Dell Technologies has released a security advisory detailing multiple critical vulnerabilities in its Dell Unity…

2 hours ago