This is a bit complicated... Secure Boot *capability* is required by Win11 [it does not force you to enable it], and is probably turned on from the factory for relatively recent purchased systems. With Secure Boot the BIOS compares any bootloader it finds with a master list that's stored in the BIOS firmware -- if the list says it's a known good bootloader then the BIOS will proceed to fire it up & the OS, Windows, Linux etc. will start up. Problem is that the listing of good & bad bootloaders is out of date -- vulnerable bootloaders are unfortunately included. And at least one UEFI bootkit is able to get around Secure Boot. A bootkit like BlackLotus is able to start before Windows -- because of that, it can control Windows to an extent, and it's terribly difficult to get rid of.
Microsoft fixed the original problem with a new bootloader, but BlackLotus for example can roll back the bootloader to an earlier, vulnerable version. The logical way to prevent that is make sure all the older, vulnerable bootloaders are listed as forbidden so Secure Boot won't run them, but there are 2 problems with that... One, manufacturers could release new BIOS firmware for everything, but most PCs / laptops are no longer supported, so manufacturers would not do that. And 2, the forbidden list is now so large that it wouldn't fit in the limited storage space used by many [most?] BIOS.
Microsoft's solution is to use a Windows Defender Application Control policy to block vulnerable boot loaders ["Windows boot managers from the past 10+ years"], tying it to the BIOS: "When the policy is applied to a Windows system, the boot manager will “lock” the policy to the system by adding a variable to the UEFI firmware." And that opens up its own can of worms... some systems will break, and currently there is no compatible way to boot to USB sticks etc. Microsoft will slowly roll out this fix by the 1st quarter of 2024.
Updates will be released as follows:Initial Deployment This phase starts with updates released on May 9, 2023, and provides basic mitigations,
Second Deployment This phase starts with updates released on July 11, 2023, which adds additionally support mitigating the issue.
Enforcement The final enforcement phase that will make the mitigations permanent. Tentatively scheduled for the first quarter of 2024.
support.microsoft[.]com/en-us/topic/kb5027455-guidance-for-blocking-vulnerable-windows-boot-managers-522bb851-0a61-44ad-aa94-ad11119c5e91
support.microsoft[.]com/en-us/topic/kb5025885-how-to-manage-the-windows-boot-manager-revocations-for-secure-boot-changes-associated-with-cve-2023-24932-41a975df-beb2-40c1-99a3-b3ff139f832d