UEFI flaws allow bootkits to pwn potentially hundreds of devices using images

Source: The Register

Article note: LO fucking L. The code that locates and parses those silly splash-screen images is exploitable in every major UEFI implementation. UEFI continues to be goofy un-managed complexity, and Secure/Verified Boot schemes continue to not deliver on security promises and only provide vendors additional leverage over customer devices, as they always have.

Exploits bypass most secure boot solutions from the biggest chip vendors

Hundreds of consumer and enterprise devices are potentially vulnerable to bootkit exploits through unsecured BIOS image parsers.…

This entry was posted in News. Bookmark the permalink.

Leave a Reply

Your email address will not be published. Required fields are marked *