Source: The Register
Article note: LO fucking L. The code that locates and parses those silly splash-screen images is exploitable in every major UEFI implementation.
UEFI continues to be goofy un-managed complexity, and Secure/Verified Boot schemes continue to not deliver on security promises and only provide vendors additional leverage over customer devices, as they always have.
Exploits bypass most secure boot solutions from the biggest chip vendors
Hundreds of consumer and enterprise devices are potentially vulnerable to bootkit exploits through unsecured BIOS image parsers.…