Secure Boot useless on PCs from major vendors after key leak
A study by Binarily found that hundreds of PCs from major manufacturers are vulnerable due to a leaked 12-year-old test platform key, allowing attackers to bypass Secure Boot protections.
Read original articleA recent study by Binarily has revealed that hundreds of PCs from major manufacturers, including Dell, Acer, and HP, are vulnerable due to the use of a leaked 12-year-old test platform key (PK) in their UEFI Secure Boot implementations. This key, which was leaked in 2022, allows attackers to bypass Secure Boot protections by manipulating key databases. The researchers noted that over ten percent of the firmware images analyzed are susceptible to exploitation using this untrusted PK, which was issued by American Megatrends International. The presence of "DO NOT TRUST" labels on the key indicates that it was not intended for production use. If exploited, this vulnerability could allow untrusted code to run during the boot process, compromising the entire security chain from firmware to the operating system. Binarily has released a free tool to help users check their systems for this vulnerability, termed "PKFail." In related security news, TracFone has been fined $16 million by the FCC for failing to secure customer data, leading to breaches that compromised personal information. Additionally, a report from Cisco Talos highlighted that 80% of ransomware incidents in Q2 occurred in organizations lacking multifactor authentication, emphasizing the need for improved security measures.
Related
Vulnerability in Popular PC and Server Firmware
Eclypsium found a critical vulnerability (CVE-2024-0762) in Intel Core processors' Phoenix SecureCore UEFI firmware, potentially enabling privilege escalation and persistent attacks. Lenovo issued BIOS updates, emphasizing the significance of supply chain security.
No More Blue Fridays
Future computers aim to avoid crashes from bad updates, like a recent global outage caused by a security company's flawed update. eBPF technology offers secure kernel execution to prevent such incidents.
Microsoft says 8.5M systems hit by CrowdStrike BSOD, releases USB recovery tool
Microsoft addressed issues caused by a faulty CrowdStrike security update affecting 8.5 million Windows systems. A USB recovery tool was released to delete the problematic file, emphasizing the need for thorough update testing.
Secure Boot is completely broken on 200 models from 5 big device makers
Researchers from Binarly found that Secure Boot is compromised on over 200 device models due to a leaked cryptographic key, posing significant security risks until manufacturers issue firmware updates.
Privacy Guides Adds New "Hardware Recommendations" Section
Hardware plays a crucial role in data security, emphasizing the need for ongoing updates, trusted components, and effective privacy measures to protect against unauthorized access and vulnerabilities.
Some more discussion days ago: https://news.ycombinator.com/item?id=41071708
Related
Vulnerability in Popular PC and Server Firmware
Eclypsium found a critical vulnerability (CVE-2024-0762) in Intel Core processors' Phoenix SecureCore UEFI firmware, potentially enabling privilege escalation and persistent attacks. Lenovo issued BIOS updates, emphasizing the significance of supply chain security.
No More Blue Fridays
Future computers aim to avoid crashes from bad updates, like a recent global outage caused by a security company's flawed update. eBPF technology offers secure kernel execution to prevent such incidents.
Microsoft says 8.5M systems hit by CrowdStrike BSOD, releases USB recovery tool
Microsoft addressed issues caused by a faulty CrowdStrike security update affecting 8.5 million Windows systems. A USB recovery tool was released to delete the problematic file, emphasizing the need for thorough update testing.
Secure Boot is completely broken on 200 models from 5 big device makers
Researchers from Binarly found that Secure Boot is compromised on over 200 device models due to a leaked cryptographic key, posing significant security risks until manufacturers issue firmware updates.
Privacy Guides Adds New "Hardware Recommendations" Section
Hardware plays a crucial role in data security, emphasizing the need for ongoing updates, trusted components, and effective privacy measures to protect against unauthorized access and vulnerabilities.