Thursday, February 2, 2023
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > High severity flaws were discovered in UEFI implementations

High severity flaws were discovered in UEFI implementations

Several vendors' UEFI firmware has high severity flaws that may result in persistent malware installations.


Rusen Gobel Rusen Gobel
February 3, 2022
2 min read
High severity flaws were discovered in UEFI implementations

The security company Binarly has released a new whitepaper related to the vulnerabilities they found on the UEFI firmware. According to the whitepaper, the companies who adopted Insyde’s InsydeH2O firmware framework code are all affected by the vulnerability. Those companies are Fujitsu, Siemens, Dell, HP, HPE, Lenovo, Microsoft, Intel, and Bull Atos.

CVSS scores are “High”

There are 23 high-severity flaws related to the InsydeH2O firmware framework, according to Binarly. It is possible to install malware that can survive a complete reinstallation of the operating system by using those flaws which have CVSS scores between 7.5 and 8.2. It also allows bypassing the endpoint security solutions, Secure Boot, and virtualization-based isolations.

UEFI is the software that replaced BIOS in modern systems. It sits between the operating system and the firmware, providing the most important settings related to hardware, in a visually advanced interface. UEFI is not installed on any type of hard drive or SSD; it has its dedicated chip embedded in the motherboard. This is why any kind of compromise to the UEFI will survive operating system reinstallations, or even replacing storage drives.

Three types of vulnerabilities

The whitepaper shows that there are 3 different vulnerability types in their current findings: SMM callout (privilege escalation), SMM memory corruption, and DXE memory corruption. Those have all different CVE IDs which you can see all of them below:

Malicious actors who can exploit those flaws can run arbitrary code with SSM permissions stealthy to deploy the second stage which enables persistent and non-persistent malware installation. At this point, the attacker can install a variety of levels of firmware, which can be either a modified module or a standalone driver.

The company behind those flawed UEFIs, Insyde, has released firmware patches to fix the vulnerabilities. However, it might take a long time for those fixes to arrive at vulnerable devices.

See more Cybersecurity News


Tags: Binarly
Rusen Gobel

Rusen Gobel

Rusen Gobel is a news editor at Cloud7 News. With more than 10 years of experience, Rusen worked as a hardware and software news editor for technology sites such as Shiftdelete, Teknokolis, Hardware Plus, BT Haber. In addition, Rusen publishes consumer product reviews on his YouTube channel. While consumer electronics has been his main focus for years, now Rusen is more interested in WordPress and software development. He had contributed different web application projects in his professional career. Rusen had graduated from Istanbul University, department of Computer Engineering. Rusen has a very high passion for learning and writing for every kind of technology. That's why he has been working as a tech editor for more than ten years on several different technology magazines and online news portals.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Next Post
Linux Lite 5.8 is released, download now

Linux Lite 5.8 is released, download now

Related News

APTs are looking for developers to hire with hefty paychecks

APTs are looking for developers to hire with hefty paychecks

February 1, 2023 2:30 pm
US extradites ShinyHunters hacker

US extradites ShinyHunters hacker

February 1, 2023 1:30 pm
Hacker steals code signing certificates for GitHub Desktop and Atom

Hacker steals code signing certificates for GitHub Desktop and Atom

February 1, 2023 1:00 pm
QNAP releases a patch for a new critical flaw affecting NAS devices

QNAP releases a patch for a new critical flaw affecting NAS devices

February 1, 2023 11:00 am
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter
Select list(s):

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy

Get the free newsletter

Subscribe to receive the latest IT business updates straight to your inbox.

Select list(s):

Check your inbox or spam folder to confirm your subscription.

Editor's Choice

What’s new in Linux kernel 6.2 rc6?

10 Best Web Hosting Services of 2023

Ubuntu 22.04 LTS is available for download. What is new?

CERN and Fermilab recommend AlmaLinux

7 best hosting control panels of 2023

How to update Linux Kernel without rebooting?

7 best Linux mail servers of 2023

7 best cPanel alternatives for 2023

7 best Linux web browsers for 2023

7 best CentOS alternatives

7 best Linux server distros of 2023

Interview with Igor Seletskiy on AlmaLinux

How to create a VM on VMware Workstation

Recent News

  • Gcore introduces per-minute billing for video streaming
  • APTs are looking for developers to hire with hefty paychecks
  • F5 reports first quarter financial results
  • US extradites ShinyHunters hacker
  • Hacker steals code signing certificates for GitHub Desktop and Atom

Cloud7 News
Cloud7 is a news source that publishes the latest news, reviews, comparisons, opinions, and exclusive interviews to help tech users of high-experience levels in the IT industry.

EXPLORE

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • How-Tos
  • Troubleshooting

RESOURCES

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2023, Cloud7 News. All rights reserved.

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

© 2023, Cloud7 News. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.