Bitcoin on Nostr: LogoFAIL: Universal Firmware Exploit Threatens Windows and Linux Systems A new ...
LogoFAIL: Universal Firmware Exploit Threatens Windows and Linux Systems
A new firmware attack named LogoFAIL has been discovered, targeting computers running Windows or Linux on UEFI firmware by IBVs such as AMI, Insyde, and Phoenix. This vulnerability allows attackers to rewrite the boot-up logo, bypassing advanced security measures and potentially installing undetectable bootkits.
- LogoFAIL executes during the DXE phase of the system boot, impacting platforms with Intel, AMD, or ARM processors.
- While Macs and certain OEM PCs have protection against this exploit, many systems are at risk and require UEFI security patches from their motherboard manufacturers or OEMs.
https://www.tomshardware.com/pc-components/motherboards/logofail-exploit-bypasses-hardware-and-software-security-measures-and-is-nearly-impossible-to-detect-or-removePublished at
2023-12-11 21:49:41Event JSON
{
"id": "a63231c6fe9f26ed77e77dcf2ad592e14923674df80aa26856347b4f18b922f6",
"pubkey": "6bb28e797d075bd0a822769b0173f8d0fc876fedeba4168f238709631be41273",
"created_at": 1702331381,
"kind": 1,
"tags": [
[
"r",
"https://www.tomshardware.com/pc-components/motherboards/logofail-exploit-bypasses-hardware-and-software-security-measures-and-is-nearly-impossible-to-detect-or-remove"
]
],
"content": "LogoFAIL: Universal Firmware Exploit Threatens Windows and Linux Systems\n\nA new firmware attack named LogoFAIL has been discovered, targeting computers running Windows or Linux on UEFI firmware by IBVs such as AMI, Insyde, and Phoenix. This vulnerability allows attackers to rewrite the boot-up logo, bypassing advanced security measures and potentially installing undetectable bootkits.\n\n - LogoFAIL executes during the DXE phase of the system boot, impacting platforms with Intel, AMD, or ARM processors.\n\n - While Macs and certain OEM PCs have protection against this exploit, many systems are at risk and require UEFI security patches from their motherboard manufacturers or OEMs.\n\nhttps://www.tomshardware.com/pc-components/motherboards/logofail-exploit-bypasses-hardware-and-software-security-measures-and-is-nearly-impossible-to-detect-or-remove",
"sig": "5009660a7dd65df3d71c7b70b60aa04d4f427869549edd891b476884f663384aba68df245eb67f7174a0125e5dc390c3e6665de0b38e23684802ee9d6d83611e"
}