LogoFAIL: A new vulnerability affects hundreds of devices



What you need to know

  • Cybersecurity researchers Binarly discovered a vulnerability named LogoFAIL.
  • They recently released their findings at BlackHat Europe. 
  • LogoFAIL takes advantage of vulnerabilities in the UEFI reference code.
  • Check for UEFI security updates from your device or motherboard manufacturer.

One of the widest-spread vulnerabilities in recent memory was made public this week by Binarly at BlackHat Europe, a conference for “ethical” hackers. LogoFAIL affects potentially millions of endpoints and hundreds of device models. “All three major IBVs are impacted — AMI, Insyde, and Phoenix due to multiple security issues related to image parsers they are shipping as a part of their firmware”

What is LogoFAIL

LogoFAIL is a “set of security vulnerabilities affecting different image parsing libraries used in the system firmware by various vendors during the device boot process.” It affects devices by placing malicious code inside of an image file that is parsed during boot leading to persistence. If you want to read more in-depth coverage of the LogoFAIL research, check out Binarly’s site. 

When these images are parsed during boot, the vulnerability can be triggered and an attacker-controlled payload can arbitrarily be executed to hijack the execution flow and bypass security features like Secure Boot, including hardware-based Verified Boot mechanisms (like Intel Boot Guard, AMD Hardware-Validated Boot or ARM TrustZone-based Secure Boot).

Binarly





Source link

Previous articleJobs signed Apple check to RadioShack up for auction with this fascinating connection [U: $46K final price]
Next articleThreads finally gets hashtags and there’s officially no reason to keep using Twitter