Just about every Windows and Linux device vulnerable to new LogoFAIL firmware attack

Soldato
Joined
10 Jul 2010
Posts
7,076
This thread should probably belong in the motherboard section, but I feel that it will be seen by more people here.

Hundreds of Windows and Linux computer models from virtually all hardware makers are vulnerable to a new attack that executes malicious firmware early in the boot-up sequence, a feat that allows infections that are nearly impossible to detect or remove using current defense mechanisms.

The attack—dubbed LogoFAIL by the researchers who devised it—is notable for the relative ease in carrying it out, the breadth of both consumer- and enterprise-grade models that are susceptible, and the high level of control it gains over them. In many cases, LogoFAIL can be remotely executed in post-exploit situations using techniques that can’t be spotted by traditional endpoint security products. And because exploits run during the earliest stages of the boot process, they are able to bypass a host of defenses, including the industry-wide Secure Boot, Intel’s Secure Boot, and similar protections from other companies that are devised to prevent so-called bootkit infections.
Just about every Windows and Linux device vulnerable to new LogoFAIL firmware attack - Ars Technica

I only stumbled upon this by accident when checking for a BIOS update and noticed the mention of LogoFAIL. I found the above article after Googling and felt that others should know, so they can apply BIOS updates if any have been released for their motherboards.
 
Back
Top Bottom