fosstodon.org is one of the many independent Mastodon servers you can use to participate in the fediverse.
Fosstodon is an invite only Mastodon instance that is open to those who are interested in technology; particularly free & open source software. If you wish to join, contact us for an invite.

Administered by:

Server stats:

10K
active users

If you use a Windows or Linux device, it's vulnerable to a new post-exploit attack that can remotely install an undetectable backdoor at the UEFI level. Updates from just about every vendor available today. Impressive work from @matrosov and the rest of Binarly.

arstechnica.com/security/2023/

Ars Technica · Just about every Windows and Linux device vulnerable to new LogoFAIL firmware attackUEFIs booting Windows and Linux devices can be hacked by malicious logo images.

@matrosov

It's 2023, and not only can malicious images still remotely execute malicious code on your devices, but they can do it at the UEFI level, during bootup, enabling invisible firmware bootkits. This new post-exploit attack, known as LogoFAIL, is mind-blowing. Amazing that an entire ecosystem comprising dozens of wealthy companies couldn't be bothered to fuzz the UEFIs they provide to billions of people. With a small amount of effort, this attack could have been closed off a decade ago.

arstechnica.com/security/2023/

Ars Technica · Just about every Windows and Linux device vulnerable to new LogoFAIL firmware attackUEFIs booting Windows and Linux devices can be hacked by malicious logo images.

@matrosov

Lots of people asking what the CVEs are and where announcements from various parties can be found. This is a massive, massive (un)coordinated disclosure. Lots of broken or non-existent links at the moment. I'm expecting things will straighten out in an hour or two. Please be patient.

A CERT coordination center has published an advisory on LogoFail, but unfortunately, it doesn't tell us much. It confirms that AMI, Insyde, Intel and Phoenix are affected and that Microsoft and Toshiba are not. But the remaining 20 companies are fall in the "unknown" category. One of the unknowns is Lenovo, which has already confirmed that it is affected.

Also, no CVEs.

¯_(ツ)_/¯

kb.cert.org/vuls/id/811862

kb.cert.orgCERT/CC Vulnerability Note VU#811862Image files in UEFI can be abused to modify boot behavior

@dangoodin I know my @system76 uses Insyde firmware... my machine is older but I hope I get a fix 🙏

System76 :popos: :ubuntu:

@golemwire @dangoodin since you can't change the logo in firmware this wouldn't effect your system.