{"id":59638,"date":"2023-12-01T15:12:06","date_gmt":"2023-12-01T20:12:06","guid":{"rendered":"http:\/\/pappp.net\/?guid=325644f16e83119a56faa0cdfae0baf1"},"modified":"2023-12-01T18:18:21","modified_gmt":"2023-12-01T23:18:21","slug":"uefi-flaws-allow-bootkits-to-pwn-potentially-hundreds-of-devices-using-images","status":"publish","type":"post","link":"https:\/\/pappp.net\/?p=59638","title":{"rendered":"UEFI flaws allow bootkits to pwn potentially hundreds of devices using images"},"content":{"rendered":"<p class=\"syndicated-attribution\">Source: <a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2023\/12\/01\/uefi_image_parser_flaws\/\">The Register<\/a><\/p>\n<div style=\"background-color : #fff7d5;\n\t\t\tborder-width : 1px; padding : 5px; border-style : dashed; border-color : #e7d796;margin-bottom : 1em; color : #9a8c59;\">Article note: LO fucking L.  The code that locates and parses those silly splash-screen images is exploitable in every major UEFI implementation.  \n\nUEFI continues to be goofy un-managed complexity, and Secure\/Verified Boot schemes continue to not deliver on security promises and only provide vendors additional leverage over customer devices, as they always have.<\/div><h4>Exploits bypass most secure boot solutions from the biggest chip vendors<\/h4> <p>Hundreds of consumer and enterprise devices are potentially vulnerable to bootkit exploits through unsecured BIOS image parsers.&hellip;<\/p> <p><!--#include virtual='\/data_centre\/_whitepaper_textlinks_top.html' --><\/p>","protected":false},"excerpt":{"rendered":"<p>Exploits bypass most secure boot solutions from the biggest chip vendors Hundreds of consumer and&#8230;<\/p>\n<p> <a href=\"https:\/\/pappp.net\/?p=59638\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[226],"tags":[],"class_list":["post-59638","post","type-post","status-publish","format-standard","hentry","category-news-2"],"_links":{"self":[{"href":"https:\/\/pappp.net\/index.php?rest_route=\/wp\/v2\/posts\/59638","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pappp.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pappp.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pappp.net\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pappp.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=59638"}],"version-history":[{"count":0,"href":"https:\/\/pappp.net\/index.php?rest_route=\/wp\/v2\/posts\/59638\/revisions"}],"wp:attachment":[{"href":"https:\/\/pappp.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=59638"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pappp.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=59638"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pappp.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=59638"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}