CERT Recently Published Vulnerability Notes 2024年07月06日
VU#811862: Image files in UEFI can be abused to modify boot behavior
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

Binarly 发现了一系列 UEFI 图像解析库中的漏洞,这些漏洞可能被攻击者利用来修改 UEFI 设置。UEFI 固件提供了一个可扩展的接口,用于在操作系统和硬件平台之间进行通信,而 ESP(EFI 系统分区)是 UEFI 固件用来存储设置和文件的专用分区。攻击者可以利用这些漏洞来访问和修改 ESP 中存储的高权限 UEFI 设置,从而可能导致系统被劫持或数据泄露。

🤔 Binarly 发现了一系列 UEFI 图像解析库中的漏洞,这些漏洞可能被攻击者利用来修改 UEFI 设置。这些漏洞存在于处理 ESP(EFI 系统分区)中存储的图像文件的库中,而 ESP 是 UEFI 固件用来存储设置和文件的专用分区。

💻 攻击者可以利用这些漏洞来访问和修改 ESP 中存储的高权限 UEFI 设置,从而可能导致系统被劫持或数据泄露。例如,攻击者可以修改启动顺序或禁用安全功能,从而获得对系统的控制权。

⚠️ 这些漏洞的影响范围广泛,可能影响各种设备,包括笔记本电脑、台式机和服务器。建议用户及时更新 UEFI 固件,并采取其他安全措施来保护系统。

🛡️ 为了解决这些漏洞,厂商已经发布了安全更新,建议用户及时更新 UEFI 固件。此外,用户还可以采取其他安全措施,例如禁用不必要的 UEFI 功能,并使用强密码来保护系统。

🤝 Binarly 将这些漏洞称为 LogoFAIL,并与主要 BIOS 供应商合作,以解决这些问题。建议用户及时更新 UEFI 固件,并采取其他安全措施来保护系统。

Overview

Implementation of Unified Extensible Firmware Interface (UEFI) by Vendors provide a way to customize logo image displayed during the early boot phase. Binarly has uncovered vulnerabilities in the image parsing libraries that provide this capability. An attacker with local privileged access can exploit these vulnerability to modify UEFI settings.

Description

UEFI firmware provides an extensible interface between an operating system and hardware platform. UEFI software stores a number of settings and files in a customized Extensible Firmware Interface (EFI) partition known as EFI system partition (ESP). ESP is a special privileged file system that is independent of the OS and essentially acts as the storage place for the UEFI boot loaders, applications, hardware drivers and customizable settings to be launched by the UEFI firmware. The ESP partition is mandatory for UEFI boot and is protected from unprivileged access. The information stored in ESP is probed and processed during the early phases of an UEFI based OS. One such information stored in the ESP is a personalizable boot logo.

Binarly has discovered a number of vulnerabilities in the image parsing libraries that read and process these image files. As these files are processed by executables that run under a high privilege, it is possible to exploit these vulnerabilities in order to access and modify high-privileged UEFI settings of a device. UEFI supply-chain allows for many of these shared libraries to be integrated in various ways, including compiled from source, licensed for modification and reuse and finally as a dynamic or static linked executable. Binarly has also observed that in some cases an attacker can create a bundled firmware update that contains a corrupt or malicious image to trigger these vulnerabilities. This can also allow an attacker to exploit vulnerability while flashing the PCI with a firmware update. Due to the complex nature of these vulnerabilities and their potential wide impact, Binarly would like to use the label LogoFAIL to track and support coordination and mitigation of these vulnerabilities.

Note: Major Independent BIOS Vendors (IBV) have obtained CVE to track this set of vulnerabilities for their supply-chain partners and their customers.

Binarly AdvisoryCVE'sPrimary Vendor
BRLY-2023-018CVE-2023-39539 AMI
BRLY-2023-006 (1) CVE-2023-40238 Insyde
BRLY-2023-006 (2) CVE-2023-5058 Phoenix

Vendor Information

One or more vendors are listed for this advisory. Please reference the full report for more information.

Other Information

CVE IDs: CVE-2023-40238 CVE-2023-5058 CVE-2023-39539
Date Public: 2023-12-06
Date First Published: 2023-12-06
Date Last Updated: 2024-03-04 19:06 UTC
Document Revision: 6

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

UEFI 漏洞 安全 LogoFAIL ESP
相关文章