171
submitted 11 months ago by queue to c/technology@lemmy.world

Firmware security company Binarly on Wednesday disclosed the details of an attack method that can be used to compromise many consumer and enterprise devices by leveraging malicious UEFI logo images.

The attack method, dubbed LogoFAIL, exploits vulnerabilities in the image parsers used by the UEFI firmware to display logos during the boot process or in the BIOS setup. Getting the affected parsers to process a specially crafted image can enable the attacker to hijack the execution flow and run arbitrary code.

Hackers can use the LogoFAIL attack to compromise the entire system and bypass security measures such as Secure Boot.

“These vulnerabilities can compromise the entire system’s security, rendering ‘below-the-OS’ security measures like any shade of Secure Boot ineffective, including Intel Boot Guard. This level of compromise means attackers can gain deep control over the affected systems,” Binarly explained.

Binarly’s analysis showed that UEFI vendors use various types of parsers for BMP, PNG, JPEG, GIF and other types of images. The security firm’s research targeted firmware from Insyde, AMI and Phoenix and led to the discovery of two dozen vulnerabilities, more than half of which have been assigned a ‘high severity’ rating.

The impacted firmware is shipped with hundreds of consumer and enterprise computer models — including x86 and ARM-based devices — made by companies such as Acer, Dell, Framework, Fujitsu, Gigabyte, HP, Intel, Lenovo, MSI, Samsung, and Supermicro. This means millions of devices worldwide could be exposed to attacks.

A LogoFAIL attack can be launched by abusing the firmware update procedure to replace the legitimate logo with a malicious version. Attacks through physical access may also be possible, using an SPI flash programmer, assuming that the logo is not protected by hardware verified boot technologies.

Some vendors — this includes Intel, Acer and Lenovo — offer features that enable users to customize the logos displayed during boot, which can make it possible to launch LogoFAIL attacks from the OS, without the need for physical access to the device.

It’s important to note that while image parser vulnerabilities have been found in devices from all of the aforementioned vendors, they cannot always be exploited. In Dell’s case, for instance, the logo is protected by Intel Boot Guard, which prevents its replacement even if the attacker has physical access to the targeted system. In addition, Dell does not offer any logo customization features.

Details of the attack were presented by Binarly at the Black Hat Europe conference on Wednesday, and the company has published a technical blog post describing its findings.

The security firm has published a video showing a proof-of-concept (PoC) LogoFAIL exploit in action, demonstrating how an attacker who has admin permissions on the operating system can escalate privileges to the firmware level.

The vulnerabilities were reported to impacted vendors through CERT/CC several months ago, but it can take a lot of time for patches for these types of security holes to reach end devices, even if vendors create the fixes.

top 8 comments
sorted by: hot top controversial new old
[-] Gamers_Mate@kbin.social 24 points 11 months ago

Would it be safer to just remove any logo and just have it boot without a logo?

[-] cheese_greater@lemmy.world 16 points 11 months ago

What fun would that be /s?

[-] lurch@sh.itjust.works 9 points 11 months ago

If you're a manufacturer, yes. To do this as an end user, no.

[-] elbarto777@lemmy.world 6 points 11 months ago

Yes, that would be safer. But then the terrorists win.

[-] cm0002@lemmy.world 15 points 11 months ago

offer features that enable users to customize the logos displayed during boot, which can make it possible to launch LogoFAIL attacks from the OS, without the need for physical access to the device.

This is why we can't have nice things :( these manufacturers will probably stop putting this neat feature in now

[-] glowie@h4x0r.host 9 points 11 months ago

RIP from a supply chain attack

[-] problembasedperson@lemmy.dbzer0.com 3 points 11 months ago* (last edited 11 months ago)

Reminds me of the original PSP, on which homebrew hackers used a similar exploit using vulnerabilities in the image viewer by loading a corrupted TIFF, causing a buffer overflow that let the user load unverified code.

[-] disheveledWallaby@lemmy.ml 1 points 11 months ago* (last edited 11 months ago)

Wondering how/if this exploit would effect an OS with luks encryption? How could the arbitrary code compromise the encrypted volume? Could it be kept in memory and ran after volume decryption?

I don't have any real understanding of how code executed before bootloader works or if it's presistant after boot.

this post was submitted on 07 Dec 2023
171 points (100.0% liked)

Technology

59166 readers
2030 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS