• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
dozens of security flaws discovered in uefi firmware used by

Dozens of Security Flaws Discovered in UEFI Firmware Used by Several Vendors

You are here: Home / General Cyber Security News / Dozens of Security Flaws Discovered in UEFI Firmware Used by Several Vendors
February 2, 2022

As several as 23 new superior severity security vulnerabilities have been disclosed in diverse implementations of Unified Extensible Firmware Interface (UEFI) firmware applied by quite a few distributors, which includes Bull Atos, Fujitsu, HP, Juniper Networks, Lenovo, amongst others.

The vulnerabilities reside in Insyde Software’s InsydeH2O UEFI firmware, in accordance to organization firmware security business Binarly, with a greater part of the anomalies identified in the System Management Manner (SMM).

UEFI is a software package specification that delivers a common programming interface connecting a computer’s firmware to its working method during the booting system. In x86 units, the UEFI firmware is typically stored in the flash memory chip of the motherboard.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Automatic GitHub Backups

“By exploiting these vulnerabilities, attackers can properly install malware that survives operating process re-installations and enables the bypass of endpoint security alternatives (EDR/AV), Secure Boot, and Virtualization-Centered Security isolation,” the scientists explained.

Productive exploitation of the flaws (CVSS scores: 7.5 – 8.2), could let a malicious actor to operate arbitrary code with SMM permissions, a unique-intent execution method in x86-based processors that handles electric power management, components configuration, thermal monitoring, and other features.

UEFI Firmware

“SMM code executes in the optimum privilege stage and is invisible to the OS, which would make it an attractive target for destructive action,” Microsoft notes in its documentation, introducing the SMM attack vector could be abused by a piece of nefarious code to trick an additional code with better privileges into executing unauthorized routines.

Prevent Data Breaches

Even worse, the weaknesses can also be chained together to bypass security attributes and put in malware in a manner that survives operating program re-installations and attain lengthy-phrase persistence on compromised programs — as noticed in the situation of MoonBounce — while stealthily creating a communications channel to exfiltrate sensitive info.

Insyde has introduced firmware patches that tackle these shortcomings as aspect of the coordinated disclosure course of action. But the truth that the application is utilised in quite a few OEM implementations indicates it could get a appreciable sum of time before the fixes in fact trickle down to afflicted gadgets.

Located this report interesting? Abide by THN on Facebook, Twitter  and LinkedIn to read through much more distinctive information we write-up.


Some components of this report are sourced from:
thehackernews.com

Previous Post: «hacker group 'moses staff' using new strifewater rat in ransomware Hacker Group ‘Moses Staff’ Using New StrifeWater RAT in Ransomware Attacks
Next Post: Scottish Agency Still Recovering from 2020 Ransomware Attack Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections

Copyright © TheCyberSecurity.News, All Rights Reserved.