MacMusic  |  PcMusic  |  440 Software  |  440 Forums  |  440TV  |  Zicos
intel
Search

New Intel Firmware Boot Verification Bypass Enables Low-Level Backdoors

Saturday May 11, 2019. 02:50 AM , from Slashdot
itwbennett writes: At the Hack in the Box conference in Amsterdam this week, researchers Peter Bosch and Trammell Hudson presented a new attack against the Boot Guard feature of Intel's reference UEFI implementation, known as Tianocore. The attack, which can give an attacker full, persistent access, involves replacing a PC's SPI flash chip with one that contains rogue code, reports Lucian Constantin for CSO. 'Even though such physical attacks require a targeted approach and will never be a widespread threat, they can pose a serious risk to businesses and users who have access to valuable information,' writes Constantin. Intel has patches available for Tianocore, but as we all remember from the Meltdown and Spectre vulnerabilities, distributing UEFI patches isn't an easy process.

Read more of this story at Slashdot.
rss.slashdot.org/~r/Slashdot/slashdot/~3/GzOIPudUVXg/new-intel-firmware-boot-verification-bypass-ena...
News copyright owned by their original publishers | Copyright © 2004 - 2024 Zicos / 440Network
Current Date
Apr, Sat 20 - 11:38 CEST