UEFI vulnerabilities: The Far-Reaching Consequences of LogoFAIL

Discussion in 'other security issues & news' started by BoerenkoolMetWorst, Dec 2, 2023.

  1. BoerenkoolMetWorst

    BoerenkoolMetWorst Registered Member

    Joined:
    Dec 22, 2009
    Posts:
    4,943
    Location:
    Outer space
    https://binarly.io/posts/The_Far_Reaching_Consequences_of_LogoFAIL/index.html
     
  2. waking

    waking Registered Member

    Joined:
    Jan 25, 2016
    Posts:
    176
    Windows and Linux devices vulnerable to new LogoFAIL firmware attack

    Dan Goodin - 12/6/2023, 10:02 AM

    https://arstechnica.com/security/2023/12/just-about-every-windows-and-linux-device-vulnerable-to-new-logofail-firmware-attack/

    "Hundreds of Windows and Linux computer models from virtually all hardware makers are
    vulnerable to a new attack that executes malicious firmware early in the boot-up
    sequence, a feat that allows infections that are nearly impossible to detect or remove
    using current defense mechanisms."

    ...


    "The affected parties are releasing advisories that disclose which of their products are
    vulnerable and where to obtain security patches. Links to advisories and a list of
    vulnerability designations appears at the end of this article."
     
  3. reasonablePrivacy

    reasonablePrivacy Registered Member

    Joined:
    Oct 7, 2017
    Posts:
    2,221
    Location:
    Member state of European Union
    Adversary needs physical or complete remote access to an administrator or root account on computer to perform this. In first case it is serious issue significantly increasing risk of leaving computer without physical security unattended. For the remaining second case you are already p0wned by something else, so it mostly adds additional persistence.
     
  4. BoerenkoolMetWorst

    BoerenkoolMetWorst Registered Member

    Joined:
    Dec 22, 2009
    Posts:
    4,943
    Location:
    Outer space
    Not necessarily. A BIOS update can be modified to include an image in the unsigned section of the update, leaving the signed section intact so the modified BIOS update will install without any problems. Given that it's not really possible to verify if a BIOS update is authentic (unless you're an expert), there are enough ways to serve modified updates to users to abuse these vulnerabilities:
    Though of course there are enough ways to compromise users machine/data without having a stealth firmware bootkit for additional persistence.
     
  5. reasonablePrivacy

    reasonablePrivacy Registered Member

    Joined:
    Oct 7, 2017
    Posts:
    2,221
    Location:
    Member state of European Union
    I assume that user downloads UEFI update from trusted sources: laptop/motherboard vendor site or LVFS through https. Of course there is a possibility that server hosting updates becomes compeomised and during that period indeed computers can become infected
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice