CVE-2023-28005 Overview
A Secure Boot bypass vulnerability exists in Trend Micro Endpoint Encryption Full Disk Encryption version 6.0.0.3204 and below. This vulnerability allows an attacker with physical access to an affected device to bypass the Microsoft Windows Secure Boot process, potentially enabling further attacks to obtain access to the contents of the device.
It is important to note that while the Secure Boot process can be bypassed, the contents of drives encrypted with TMEE FDE remain protected and would NOT be accessible to the attacker through exploitation of this vulnerability alone. The attacker would need to chain this with additional attacks to fully compromise encrypted data.
Critical Impact
Physical attackers can bypass Windows Secure Boot protections on systems running vulnerable versions of Trend Micro Endpoint Encryption, potentially enabling pre-boot attack chains while encrypted drive contents remain protected.
Affected Products
- Trend Micro Endpoint Encryption Full Disk Encryption version 6.0.0.3204 and below
- Microsoft Windows (when used with affected TMEE FDE versions)
- Systems utilizing TMEE FDE for Secure Boot attestation
Discovery Timeline
- March 22, 2023 - CVE-2023-28005 published to NVD
- May 5, 2025 - Last updated in NVD database
Technical Details for CVE-2023-28005
Vulnerability Analysis
This vulnerability falls into the category of Secure Boot Bypass, affecting the integrity of the pre-boot environment on systems protected by Trend Micro Endpoint Encryption Full Disk Encryption. The flaw enables an attacker to circumvent the Microsoft Windows Secure Boot mechanism, which is designed to ensure that only trusted software can execute during the boot process.
The vulnerability requires physical access to exploit, limiting its exposure to scenarios such as stolen devices, insider threats, or supply chain attacks. While the encrypted contents of the disk remain protected even after successful exploitation, bypassing Secure Boot opens the door to additional attack vectors such as bootkit installation, pre-boot malware execution, or manipulation of the boot chain to weaken subsequent security controls.
Root Cause
The root cause relates to how Trend Micro Endpoint Encryption Full Disk Encryption interacts with the Windows Secure Boot process. A weakness in this integration allows the boot validation chain to be subverted, permitting unauthorized code execution during the pre-boot phase despite Secure Boot being enabled.
Attack Vector
The attack requires physical access to the target system. An attacker would need to:
- Gain physical access to a device running TMEE FDE version 6.0.0.3204 or below
- Exploit the Secure Boot bypass vulnerability during the boot process
- Execute additional attacks to attempt access to device contents or establish persistence
The physical access requirement significantly limits the attack surface, but organizations with high-value assets or those concerned about insider threats should prioritize remediation.
The vulnerability manifests during the Secure Boot validation process when TMEE FDE is active. For detailed technical information, refer to the Trend Micro Security Advisory.
Detection Methods for CVE-2023-28005
Indicators of Compromise
- Unexpected modifications to boot configuration data (BCD) entries
- Anomalous boot sequence behavior or boot failures followed by successful boots
- Evidence of physical tampering with systems running TMEE FDE
- Unauthorized bootloader or pre-boot module changes detected in firmware logs
Detection Strategies
- Monitor UEFI/BIOS firmware logs for unauthorized boot configuration changes
- Implement Secure Boot event logging and review for unexpected validation failures
- Deploy endpoint detection solutions capable of monitoring boot integrity
- Conduct regular audits of TMEE FDE versions across the environment to identify vulnerable installations
Monitoring Recommendations
- Enable and centralize Windows Event logs related to boot and Secure Boot events
- Implement physical access monitoring and logging for critical systems
- Configure alerts for systems reporting boot attestation failures
- Regularly inventory and verify TMEE FDE versions using asset management tools
How to Mitigate CVE-2023-28005
Immediate Actions Required
- Identify all systems running Trend Micro Endpoint Encryption Full Disk Encryption version 6.0.0.3204 and below
- Review the Trend Micro Security Advisory for specific patch information
- Prioritize patching for systems that may be at higher risk of physical access attacks
- Implement additional physical security controls for high-value assets until patches are deployed
Patch Information
Trend Micro has released a security update addressing this vulnerability. Organizations should consult the official Trend Micro Solution Overview for detailed patch information and upgrade instructions.
Ensure that Trend Micro Endpoint Encryption Full Disk Encryption is updated to a version newer than 6.0.0.3204 to remediate this vulnerability.
Workarounds
- Implement strict physical access controls to limit unauthorized access to affected systems
- Enable additional authentication mechanisms at the BIOS/UEFI level where possible
- Consider using hardware-based Trusted Platform Module (TPM) attestation as a supplementary security control
- Monitor affected systems closely until patches can be applied
# Verify TMEE FDE version on Windows systems
# Check installed program version through Windows registry
reg query "HKLM\SOFTWARE\TrendMicro\Encryption for Endpoints" /v Version
# Review Secure Boot status
Confirm-SecureBootUEFI
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

