6.7

Table Of Contents
The error message depends on the hardware vendor and on the level at which verification did not
succeed.
n
If you attempt to boot with a bootloader that is unsigned or has been tampered with, an error during
the boot sequence results. The exact message depends on the hardware vendor. It might look like
the following error, but might look different.
UEFI0073: Unable to boot PXE Device...because of the Secure Boot policy
n
If the kernel has been tampered with, an error like the following results.
Fatal error: 39 (Secure Boot Failed)
n
If a package (VIB or driver) has been tampered with, a purple screen with the following message
appears.
UEFI Secure Boot failed:
Failed to verify signatures of the following vibs (XX)
To resolve issues with secure boot, follow these steps.
1 Reboot the host with secure boot disabled.
2 Run the secure boot verification script (see Run the Secure Boot Validation Script on an Upgraded
ESXi Host).
3 Examine the information in the /var/log/esxupdate.log file.
Run the Secure Boot Validation Script on an Upgraded ESXi Host
After you upgrade an ESXi host from an older version of ESXi that did not support UEFI secure boot, you
might be able to enable secure boot. Whether you can enable secure boot depends on how you
performed the upgrade and whether the upgrade replaced all the existing VIBs or left some VIBs
unchanged. You can run a validation script after you perform the upgrade to determine whether the
upgraded installation supports secure boot.
For secure boot to succeed, the signature of every installed VIB must be available on the system. Older
versions of ESXi do not save the signatures when installing VIBs.
n
If you upgrade using ESXCLI commands, the old version of ESXi performs the installation of the new
VIBs, so their signatures are not saved and secure boot is not possible.
n
If you upgrade using the ISO, new VIBs do have their signatures saved. This is true also for vSphere
Upgrade Manager upgrades that use the ISO.
n
If old VIBs remain on the system, the signatures of those VIBs are not available and secure boot is
not possible.
n
If the system uses a third-party driver, and the VMware upgrade does not include a new version
of the driver VIB, then the old VIB remains on the system after upgrade.
vSphere Security
VMware, Inc. 104