标题 简介 类型 公开时间
关联规则 关联知识 关联工具 关联文档 关联抓包
参考1(官网)
参考2
参考3
详情
[SAFE-ID: JIWO-2024-793]   作者: ecawen 发表于: [2017-10-08]

本文共 [343] 位读者顶过

安全厂商Cylance的安全研究员发现一些在使用Intel的UEFI BIOS固件的主板厂商的漏洞,可允许攻击者绕过BIOS固件保护,以禁用和更改UEFI BIOS固件,如设置rootkit。

Alex Matrosov, a security researcher for Cylance, has discovered several flaws in how some motherboard vendors implemented Intel's UEFI BIOS firmware into their products.

These flaws allow an attacker to bypass BIOS firmware protections, such as Intel Boot Guard and Intel BIOS Guard, to disable and alter UEFI BIOS firmware, such as placing a rootkit.

Matrosov presented his findings at the Black Hat USA 2017 security conference held in Las Vegas in August.

Flaws found in at least four motherboard series

In total, Matrosov found six vulnerabilities in four motherboards he tested, according to an interview he gave before the conference:

ASUS Vivo Mini - CVE-2017-11315[出自:jiwo.org]
Lenovo ThinkCentre systems - CVE-2017-3753
MSI Cubi2 - CVE-2017-11312 and CVE-2017-11316
Gigabyte BRIX series - CVE-2017-11313 and CVE-2017-11314

The motherboards Matrosov tested were based on AMI Aptio UEFI BIOS, a popular UEFI BIOS firmware package, also used by other motherboard OEMs such as MSI, Asus, Acer, Dell, HP, and ASRock.

OEMs don't use all of Intel's hardware protections

"Some vendors don’t enable the protections offered by modern hardware, such as the simple protection bits for SMM and SPI flash memory (BLE, BWE, PRx), which Intel introduced years ago," Matrosov explained the problem. "This makes them easy targets for attackers since they have no active memory protections at the hardware level."

Matrosov says that an attacker can exploit these implementation errors to elevate privileges, bypass BIOS protections, and deliver rootkits on a modern operating system, such as Windows 10, for which Microsoft has worked tirelessly to safeguard against rootkits.

Yesterday, Embedi security researcher Alexander Ermolov published new research based on Matrosov's initial work that bypasses the Intel Boot Guard protection system on a Gigabyte GA-H170-D3H motherboard, showing the problem is most likely more widespread that Matrosov's initial tests.

The good thing, according to Matrosov, is that motherboard vendors, including AMI, have issued UEFI BIOS firmware updates to address the flaws he discovered, and which enable the Intel hardware-level protections that come with modern CPUs.

评论

暂无
发表评论
 返回顶部 
热度(343)
 关注微信