UEFIs booting Windows and Linux devices can be hacked by malicious logo images.
Dan Goodin - 12/6/2023, 3:02 PM
Or any OS that uses UEFI. Or UEFI without an OS. So basically UEFI and not Windows or Linux at all.
That is a terrible article that leaves out pretty much everything important about the actual exploit and instead has lots of general information that most people who would be in the position to have to patch this on large numbers of machines already know.
Edit: nevermind, it is just a case of those multi-page articles for advertising reasons.
https://www.darkreading.com/endpoint-security/critical-logofail-bugs-secure-boot-bypass-millions-pcs seems better, it at least mentions that the logo files have to be placed on the EFI System partition to be loaded by the vulnerable code.
FTA, emphasis mine:
“The flaw exists in the processing of user-supplied splash screen during system boot, which can be exploited by an attacker who has physical access to the device,” according to the notification, which noted that an updated version is available. “By supplying a malicious splash screen, the attacker can cause a denial-of-service attack or execute arbitrary code in the UEFI DXE phase, bypassing the Secure Boot mechanism and compromising the system integrity.”
Sure, but physical access is already no bueno.
I wonder whether this could also be exploited remotely. IIRC, my mainboard vendor provides software to update the boot logo from within the OS. I don’t think it requires any physical interaction. It does require admin rights tho.
“There are several ways to exploit LogoFAIL. Remote attacks work by first exploiting an unpatched vulnerability in a browser, media player, or other app and using the administrative control gained to replace the legitimate logo image processed early in the boot process with an identical-looking one that exploits a parser flaw. The other way is to gain brief access to a vulnerable device while it’s unlocked and replace the legitimate image file with a malicious one.”
That’s what I get for reading it on mobile while parenting. Lol. Thanks, I obviously missed that.
this is a physical access attack. if they already have physical access they can do a million other things too. this is kind of not important to be fair.
There is a remote vector as well beyond just physical access.
There are several ways to exploit LogoFAIL. Remote attacks work by first exploiting an unpatched vulnerability in a browser, media player, or other app and using the administrative control gained to replace the legitimate logo image processed early in the boot process with an identical-looking one that exploits a parser flaw. The other way is to gain brief access to a vulnerable device while it’s unlocked and replace the legitimate image file with a malicious one.
Why does physical access matter so much if shit is properly encrypted and not live (fully shut down)? What is this sorcery that a shut-down encrypted device with tamper-mitigations can’t resist?
Maybe it’s time we give up on computers. We’re simply not good with them. Or maybe it’s just time to oxidise all the software.
Every tech we advance in will always give hackers more freedom as well, it’s how it will always be. Its also why we should have less and less info about us on the net.
What could KINDA help against this is using open source software, but wheres the spyware in that?
with OSS you dont get all those neat hidden surprises :( no fun
Coreboot!