Remotely Exploitable ‘PixieFail’ Flaws Found in Tianocore EDK II PXE Implementation

Quarkslab finds serious, remotely exploitable vulnerabilities in EDK II, the de-facto open source reference implementation of the UEFI spec.
The post Remotely Exploitable ‘PixieFail’ Flaws Found in Tianocore EDK II PXE Implementation appeared first on … Continue reading Remotely Exploitable ‘PixieFail’ Flaws Found in Tianocore EDK II PXE Implementation

Enterprise, Consumer Devices Exposed to Attacks via Malicious UEFI Logo Images

LogoFAIL is an UEFI image parser attack allowing hackers to compromise consumer and enterprise devices using malicious logo images.
The post Enterprise, Consumer Devices Exposed to Attacks via Malicious UEFI Logo Images appeared first on SecurityWeek.
Continue reading Enterprise, Consumer Devices Exposed to Attacks via Malicious UEFI Logo Images

Why is my TPM bugged? If I enable checks on PCR 8,9,10, it ALWAYS asks for decryption password even if it shouldn’t [migrated]

I’ve also checked with systemd-analyze pcrs if PCRs are the same at every reboot, and they are.
Only at first reboot I don’t know why the only PCRs that change are 8,9,10 lol(I don’t know why)… but in next reboots they are always the sam… Continue reading Why is my TPM bugged? If I enable checks on PCR 8,9,10, it ALWAYS asks for decryption password even if it shouldn’t [migrated]

Why the TPM PCRs does not consider a UEFI settings change? If someone resets CMOS, it’s undetected

In my laptop I’ve set up a bios password when I power on the laptop, and once I enter it the laptop starts my linux distro and decrypts the disk without asking any other password. To do this I’ve set up TPM to automatically decrypts the di… Continue reading Why the TPM PCRs does not consider a UEFI settings change? If someone resets CMOS, it’s undetected

NSA Issues Guidance on Mitigating BlackLotus Bootkit Infections

The National Security Agency (NSA) has released mitigation guidance to help organizations stave off BlackLotus UEFI bootkit infections.
The post NSA Issues Guidance on Mitigating BlackLotus Bootkit Infections appeared first on SecurityWeek.
Continue reading NSA Issues Guidance on Mitigating BlackLotus Bootkit Infections

Can I upload files to a certain website to see exactly what code they contain and what they do (heuristics)?

I want to upload files somewhere to see exactly what their behaviour is, but I’m not sure how. One of them is an EFI file. Does anyone know some website or method, like on a virtual machine, to check what they do?

Continue reading Can I upload files to a certain website to see exactly what code they contain and what they do (heuristics)?