{"id":37964,"date":"2025-05-07T15:13:12","date_gmt":"2025-05-07T13:13:12","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=37964"},"modified":"2025-05-07T15:28:28","modified_gmt":"2025-05-07T13:28:28","slug":"warning-iventoy-1-0-2-installs-obscure-certificates-and-drivers","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2025\/05\/07\/warning-iventoy-1-0-2-installs-obscure-certificates-and-drivers\/","title":{"rendered":"Warning: iVentoy 1.0.2 installs obscure certificates and drivers"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" title=\"Stop - Pixabay\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/06\/Stop01.jpg\" alt=\"Stop - Pixabay\" width=\"179\" height=\"179\" align=\"left\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2025\/05\/07\/achtung-bei-iventoy-es-werden-obskure-zertifikate-und-treiber-installiert\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]A short warning to blog readers who use the iVentoy tool to distribute operating system images via a network and a PXE server. There is currently a discussion that the tool (currently version 1.0.2) installs an insecure kernel driver and an obscure certificate under Windows. As long as this point has not been properly clarified, I can only advise you to \"keep your hands off this tool\". Addendum: The developer has already reacted and released version 1.0.21.<\/p>\n<p><!--more--><\/p>\n<h2>What is iVentoy?<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg06.met.vgwort.de\/na\/2257a17ce0dc49eba5ed4f56b8152388\" alt=\"\" width=\"1\" height=\"1\" \/><a href=\"https:\/\/www.iventoy.com\/en\/index.html\" target=\"_blank\" rel=\"noopener\">iVentoy<\/a> (not to be confused with <a href=\"https:\/\/www.ventoy.net\/en\/index.html\" target=\"_blank\" rel=\"noopener\">Ventoy<\/a>, which can create USB boot sticks for operating system installation) is a tool for distributing operating system images over a network.<\/p>\n<p><a href=\"https:\/\/i.postimg.cc\/cHkZ21nR\/image.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i.postimg.cc\/cHkZ21nR\/image.png\" alt=\"iVentoy\" width=\"640\" height=\"218\" \/><\/a><\/p>\n<p>The project's website states that iVentoy is an extended version of the PXE server, which can be used to boot and install operating systems on several computers simultaneously via the network.<\/p>\n<p>iVentoy is extremely easy to use, without complicated configuration. The administrator simply places the ISO file with the installation image in the specified location and selects PXE boot in the client machine. The operating system image (or installation image) is then loaded and executed on the client via the network by PXE-Boot.<\/p>\n<p>iVentoy supports x86 Legacy BIOS, IA32 UEFI, x86_64 UEFI and ARM64 UEFI mode at the same time. iVentoy supports more than 110 common variants of operating systems (Windows\/WinPE\/Linux\/VMware) according to the website.<\/p>\n<blockquote><p><span data-huuid=\"17701745220218846862\">Background information: The main developer and maintainer of the <a href=\"https:\/\/de.wikipedia.org\/wiki\/Ventoy\" target=\"_blank\" rel=\"noopener\">Ventoy<\/a> project is Hailong Sun, also known as longpanda. Longpanda is also the developer of iVentoy.<\/span><\/p><\/blockquote>\n<h2>Discussion about security issues<\/h2>\n<p>Benedikt contacted me via email (thanks) and pointed me to the reddit.com post <a href=\"https:\/\/www.reddit.com\/r\/sysadmin\/comments\/1kghjf9\/iventoy_tool_injects_malicious_certificate_and\/\" target=\"_blank\" rel=\"noopener\">iVentoy tool injects malicious certificate and driver during Win install (vulnerability found today)<\/a> from May 6, 2025. The thread starter writes that he just came across a report about a vulnerability in iVentoy. Ventoy is known for its very useful tool for creating bootable USB devices.<\/p>\n<h3>Security problem found in iVentoy<\/h3>\n<p>On GitHub there is the current entr <a href=\"https:\/\/github.com\/ventoy\/PXE\/issues\/106\" target=\"_blank\" rel=\"noopener\">iVentoy installing unsafe Windows Kernel drivers #106<\/a>, which deals with the problem. It states that iVentoy 1.0.2 can be downloaded from the <a href=\"https:\/\/github.com\/ventoy\/PXE\/releases\" target=\"_blank\" rel=\"noopener\">GitHub page<\/a> and is installing unsafe Windows Kernel drivers\u00a0via the following archives.<\/p>\n<pre class=\"notranslate\"><code class=\"notranslate\">iventoy-1.0.20-linux-free.tar.gz, iventoy-1.0.20-win32-free.zip, iventoy-1.0.20-win64-free.zip<\/code><\/pre>\n<p>All these archive files contain the entry <em>\\data\\iventoy.dat<\/em>. The .dat file is decrypted to <em>\\data\\iventoy.dat.xz<\/em> at execution time by the iVentoy app in RAM. The creator of GitHub entry #106 wrote a Python script to analyze the decrypted result and came to no positive result.<\/p>\n<h3>VirusTotal and Defender alerts<\/h3>\n<p>When the decrypted<em> iventoy.dat.xz<\/em> is opened with 7zip, some of the extracted files are found listed with positive results on Virustotal.com and Windows Defender. The file <em>iventoy.dat.xz\\iventoy.dat.\\win\\wintool.tar.xz<\/em> probably contains an obscure certificate, which Virustotal identifies as \"malicious\".<\/p>\n<p><a href=\"https:\/\/www.virustotal.com\/gui\/file\/774f9fc9556a531a6a531dbccd78e9f5a30495ff7a8f07a9cade1bfa47ffcf4e\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i.postimg.cc\/rmtmctNV\/image.png\" alt=\"wintool.tar.xz alert\" width=\"640\" height=\"544\" \/><\/a><\/p>\n<p>It also says that the analysis of \"<em>iventoy.dat.xz\\iventoy.dat.\\win\\vtoypxe64.exe<\/em>\" shows that it contains a self-signed certificate with the name 'EV' certificate \"JemmyLoveJenny EV Root CA0\" at offset=0x0002C840 length=0x70E. And it says that iVentoy installs insecure Windows kernel drivers.<\/p>\n<h2>A warning from Talos<\/h2>\n<p>This certificate rings all the alarm bells, because in 2023 Talos-Security published the article <a href=\"https:\/\/blog.talosintelligence.com\/old-certificate-new-signature\/\" target=\"_blank\" rel=\"noopener\">Old certificate, new signature: Open-source tools forge signature timestamps on Windows drivers<\/a> with a warning.<\/p>\n<p>Cisco Talos has observed threat actors exploiting a Windows policy vulnerability that allows the signing and loading of unsigned kernel-mode drivers with a signature timestamp prior to July 29, 2015. According to Talos, the actors use several open-source tools that change the signing date of kernel-mode drivers. The goal is to load malicious and unverified drivers signed with expired certificates into Windows.<\/p>\n<p>Cisco Talos security researchers have observed more than a dozen code-signing certificates with keys and passwords in a PFX file hosted on GitHub and used in conjunction with these open source tools. The post also mentions the above certificate.<\/p>\n<p>Most of the drivers that Talos was able to identify contained a Simplified Chinese language code in their metadata. This points to Chinese native speakers as the authors. Cisco Talos wrote in 2023 that they had also identified a case where one of these open source tools was used to re-sign cracked drivers to circumvent digital rights management (DRM).<\/p>\n<p>Cisco Talos had published a second blog post showing the real abuse of this vulnerability by an undocumented malicious driver called RedDriver. I had reported on the scenario in July 2023 in the article\u00a0<a href=\"https:\/\/borncity.com\/win\/2023\/07\/13\/windows-malware-still-loadable-in-kernel-drivers-reddriver-attack\/\">Windows: Malware still loadable in kernel drivers (RedDriver attack)<\/a>.<\/p>\n<h2>Take care when using (also Ventoy)<\/h2>\n<p>At this point I would say \"be careful, using iVentoy\" &#8211; and also Ventoy (which contains also blobs) in older versions<span data-huuid=\"17701745220218846862\">. Shortly, after I've published the German edition of this blog post, <a href=\"https:\/\/github.com\/ventoy\/PXE\/releases\" target=\"_blank\" rel=\"noopener\">iVentoy 1.0.21<\/a> has been released. The iVentoy developer has released an <a href=\"https:\/\/github.com\/ventoy\/PXE\/issues\/106#issuecomment-2857344318\" target=\"_blank\" rel=\"noopener\">official statement<\/a> about the above suspicions:<\/span><\/p>\n<blockquote><p>OK. Let me explain about this.<\/p>\n<p>iVentoy is a tool to install Windows\/Linux through PXE. As we know, PXE is based on network, so we need a driver to mount the ISO file in the server side as a local drive (e.g. Y: Z:) though network. So I choose httpdisk.<\/p>\n<p>httpdisk is an open source project<\/p>\n<p><a href=\"https:\/\/www.accum.se\/~bosse\/httpdisk\/httpdisk-10.2.zip\" target=\"_blank\" rel=\"nofollow noopener ugc\">https:\/\/www.accum.se\/~bosse\/httpdisk\/httpdisk-10.2.zip<\/a><\/p>\n<p>httpdisk driver will only be installed in the WinPE step, that means it only exist in the RAM and will not be installed to the final Widows system in the harddisk.<\/p>\n<p>But in windows, by default a driver file must be signed to install.<br \/>\nSo I find a signed version of httpdisk driver file in the internet and try to use it. But this signed version has already been rejected by latest Windows, so finally I use another way, to boot the WinPE in test mode (again, only the WinPE environment).<br \/>\nWhen WinPE is booted in test mode, a driver file no need to be signed to install.<\/p>\n<p>So finally, actually we don't need the signed version of httpdisk driver file and don't need to load the CA anymore. Only that the code is not deleted.<\/p>\n<p>So I will release a new version later that remove the signed httpdisk driver file and will not load the CA.<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>[German]A short warning to blog readers who use the iVentoy tool to distribute operating system images via a network and a PXE server. There is currently a discussion that the tool (currently version 1.0.2) installs an insecure kernel driver and &hellip; <a href=\"https:\/\/borncity.com\/win\/2025\/05\/07\/warning-iventoy-1-0-2-installs-obscure-certificates-and-drivers\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,1547,2],"tags":[69,1544,157,194],"class_list":["post-37964","post","type-post","status-publish","format-standard","hentry","category-security","category-software","category-windows","tag-security","tag-software","tag-tool","tag-windows"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/37964","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=37964"}],"version-history":[{"count":3,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/37964\/revisions"}],"predecessor-version":[{"id":37967,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/37964\/revisions\/37967"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=37964"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=37964"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=37964"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}