Header bannerHeader banner
March 20, 2025

Clevo Boot Guard Keys Leaked in Update Package

By Fabio Pagani (Binarly REsearch)

Over the past few years, the Binarly REsearch team has led the way in documenting security problems haunting the entire UEFI ecosystem.  We presented our discoveries  at major security conferences like OffensiveCon, Black Hat, LABScon and RE//verse to share data and collaborate with the industry to secure the UEFI ecosystem.

It therefore comes as no surprise that when something unusual emerges in this space, Binarly is contacted to provide technical expertise.

This story starts at the end of February 2025, when Thierry Laurion opened an issue in our SupplyChainAttacks repository, where we keep records of devices impacted by supply chain failures, such as the Intel Boot Guard keys that leaked during the MSI data breach or Intel and Lenovo source code breach.

This issue pointed to a second post hosted in the Win-Raid forum, where a user reportedly found Boot Guard Key Manifest and Boot Policy Manifest Private keys in the firmware update packages of Clevo devices.

In this blog, we document our investigation that began with this initial report and present findings with a focus on the implications of this private keys leakage.

Figure 1. The discovery of Boot Guard private keys used in Clevo devices on the Win-Raid forum.

Recon

After downloading the Clevo BIOS archive found on Win-Raid, we quickly discover two private keys embedded in the BootGuardKey.exe binary (note: a copy of these keys is also stored in the standalone files CreateDeleteBIOSKey.keyprivkey.pem and CreateDeleteBIOSKey.privkey.pem).

Figure 2. Private key modulus dump from CreateDeleteBIOSKey.keyprivkey.pem
Figure 2. Private key modulus dump from CreateDeleteBIOSKey.keyprivkey.pem
Figure 3. UEFITool showing the BootGuard Key Manifest embedded in a Clevo firmware image

After extracting the private key modulus from these keys (see Figure 2), we confirmed that they match the modules stored in the Boot Guard Key Manifest (KM) and Boot Policy Manifest (BPM) used in a Clevo firmware image found within the archive. This means that these keys can be used to sign a malicious firmware image that will pass validation at runtime, effectively bypassing Boot Guard—bingo!

Similar attacks have been demonstrated multiple times in the past: for example, the HardenedLinux team showed how a Boot Guard key leaked during the MSI data breach can be exploited to bypass Boot Guard on a MSI device.

Ecosystem-wide Scan

Given our unique insight into the UEFI firmware ecosystem, we integrated the leaked Clevo keys into our Binarly Transparency Platform to conduct an ecosystem-wide scan and identify where these keys are actually deployed. To our surprise, we discovered 15 firmware images containing these keys, corresponding to 10 unique devices.

Notably, all of these firmware images belong to recently released devices, including one for the Gigabyte G6X 9KG that was released in 2025.

Device Name ODM IBV Firmware SHA256 Firmware Version Release Date Latest Version
XPG Xenia 15G G2303_V1.0.8 Clevo Insyde fa05164f0e184b9d051aac6442e1d6988a383eadd41a1bf99d99de47930d6fc4 6.2.8320.0 2023-06-14 True
Gigabyte G5 KE Clevo Insyde 3c4a58510e071f9a0e713b7e483fd5bca304f0f4b7eb831581dfec2a8d20e62e FB05 2023-03-07 True
Gigabyte G5 KF 2024 Clevo Insyde 095014cb19b13a8a4d075f94efe44fcb73f8d6f683cf5fb379e0976f121806e6 FD06 2024-01-10 True
Gigabyte G5 KF5 2024 Clevo Insyde e629ec92a8ca755ccb3d89cc8647b15040e913549d678de298e8f14318d17342 FD07 2024-10-17 False
Gigabyte G5 KF5 2024 Clevo Insyde f59dedcc4a68053227583fca07d77b2edd67c90add4754d580dd6c3f152bfb9d FD10 2024-12-09 True
Gigabyte G5 ME Clevo Insyde 4b1ff7ae54ce8769b1c99066eeeb6baea9ab226908dffd8123ca15b6f400d76e FB04 2023-06-05 True
Gigabyte G5 ME Clevo Insyde e1b5d89fc9b9d4c02d528880e8e079baeeaa22442ad8db139901003192f41718 FB04 2023-06-05 False
Gigabyte G5 MF Clevo Insyde 34f1aeee7d4d88280ee378898b7308bbcfead6cc45fbf425ab878996711443f6 FB03 2023-04-14 True
Gigabyte G6 KF Clevo Insyde 8799a6a2aa24e6e32b87142f9327af77970fb48292f622fad51c73307b301501 FB06 2023-10-23 True
Gigabyte G6X 9KG 2024 Clevo Insyde 191c0c4f3e74e574a4f87ecaf88097e1ef3cc67d7ae72fa0daafa7487985b66a FD07 2024-01-19 False
Gigabyte G6X 9KG 2024 Clevo Insyde 1942bfe125bf9f44bd4d4a53c9143ea1c4573e4a83b0b61947a856e8c210cb7b FB10 2025-02-04 True
Gigabyte G7 KF Clevo Insyde 93125b461b258ea947bed4e9bb93915d4902a3fd3992793ba40cf5e116cd1126 FB10 2024-02-16 True
Gigabyte G7 KF Clevo Insyde cb62834b91e0bc701205c5546663fb29780bc5878fab2c538383eeb62ddcab16 FB09 2023-10-18 False
NoteBook System Firmware 1.07.07TRO1 Clevo Insyde 5f75dca52bc15c5534cafcdeb230e1d3014b8fb4e4f3743e432c8381b9e03fff 6.2.8319.7 2023-09-05 True
NoteBook System Firmware 1.07.09TRO1 Clevo Insyde a9e5ffed646e11d81117e52771b9a4c1fbea766ec2c41b16b1ae0af35f3d3e80 6.2.8319.9 2023-11-28 True
Table 1. List of Clevo / Gigabytes firmware using the leaked KM and BPM keys

An important note: the previous table includes only firmware from vendors present in our dataset. Clevo-based devices may also be used by other vendors, and we believe some other gaming-focused vendors may also be affected by this leak.

Fortunately, Clevo's mistake was not repeated by other vendors in our dataset. A scan of our internal firmware update package dataset–which counts more than 200,000 packages from all major vendors–did not reveal any Boot Guard keys leaked in a similar manner.

On February 28, 2025  we shared the BRLY-2025-002 advisory to CERT/CC to report our findings, but the case was closed a few days later without much explanation.

Vulnerability report into Clevo UEFI firmware reported by Alex Matrosov of Binarly on 02/28/2025

Conclusions

In this blog post, we highlighted the risks and impact of Boot Guard private key leaks. Since these keys are shared across multiple devices and vendors, each leak can have far-reaching consequences for the entire ecosystem.

As the screenshot below shows, the Binarly Transparency Platform can accurately detect devices affected by this Boot Guard private key leak, as well as previous ones, without any false positives.

Binarly Transparency Platform accurately detects devices affected by leak

In our upcoming RSA Conference talk"Repeatable Supply Chain Security Failures in Firmware Key Management,” we will discuss this incident along with past cases of private key management failures in the UEFI ecosystem. Save the date.

What's lurking in your firmware?