VYPR
High severity7.6NVD Advisory· Published Oct 14, 2025· Updated Apr 15, 2026

CVE-2025-11577

CVE-2025-11577

Description

Clevo’s UEFI firmware update packages, including B10717.exe, inadvertently contained private signing keys used for Boot Guard and Boot Policy Manifest verification. The exposure of these keys could allow attackers to sign malicious firmware that appears trusted by affected systems, undermining the integrity of the early boot process.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Clevo firmware update executables inadvertently leaked private Boot Guard signing keys, enabling attackers to sign and deploy malicious firmware on multiple laptop brands.

Root

Cause Clevo's UEFI firmware update packages (e.g., B10717.exe) distributed publicly contained the private RSA keys used for Intel Boot Guard's Key Manifest and Boot Policy Manifest verification [1]. This accidental exposure undermines the hardware root of trust designed to ensure only authentic firmware executes during the early boot process [2].

Exploitation

An attacker with write access to system flash storage—achieved through physical possession, malware with kernel privileges, or a compromised firmware update mechanism—can use the leaked private keys to sign a malicious firmware image [1][2]. Because the keys are trusted by the Boot Guard implementation on affected devices, the modified firmware would pass cryptographic verification and execute as if it were legitimate [2]. No additional authentication is needed once write access is obtained [1].

Impact

Successful exploitation allows persistent, stealthy control over the target system. The attacker can install arbitrary UEFI firmware that survives OS reinstalls and conventional security scans, because Boot Guard operates before the operating system loads [2]. The compromise extends to any device using Clevo as an ODM/OEM, including models from Gigabyte and XPG, with supply chain implications for multiple brands [1][2].

Mitigation

Binarly and CERT/CC have identified dozens of affected firmware versions (e.g., XPG Xenia 15G, several Gigabyte G5 series) and confirmed that not all have received patched updates [1]. Clevo has reportedly removed the affected software from public distribution, but no official firmware updates addressing the leaked keys have been announced for many impacted systems [2]. Organizations should check the advisory for specific vulnerable models and apply any available vendor updates; otherwise, devices remain at risk.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.