Just about every Windows and Linux device vulnerable to new LogoFAIL firmware attackarstechnica.comexternal-linkcross-posted to: news@lemmy.linuxuserspace.showhackernews@derp.foohackernews@lemmy.smeargle.fanstechnology@lemmy.zip Chewy ( @Chewy7324@discuss.tchncs.de ) Linux@lemmy.ml • 10 months ago message-square54fedilinkarrow-up1221
arrow-up1221external-linkJust about every Windows and Linux device vulnerable to new LogoFAIL firmware attackarstechnica.com Chewy ( @Chewy7324@discuss.tchncs.de ) Linux@lemmy.ml • 10 months ago message-square54fedilinkcross-posted to: news@lemmy.linuxuserspace.showhackernews@derp.foohackernews@lemmy.smeargle.fanstechnology@lemmy.zip
minus-square deadcade ( @deadcade@lemmy.deadca.de ) linkfedilink39•10 months agoSince the EFI partition is unencrypted, physical access would do the trick here too, even with every firmware/software security measure.
minus-square _edge ( @_edge@discuss.tchncs.de ) linkfedilink17•10 months agoTrue, but this was the case without this finding, wasn’t it? With write access to the EFI you could replace the boot loader and do whatever you please.
minus-square deadcade ( @deadcade@lemmy.deadca.de ) linkfedilink3•10 months agoUnless a proper secure boot + FDE setup is in place.
Since the EFI partition is unencrypted, physical access would do the trick here too, even with every firmware/software security measure.
True, but this was the case without this finding, wasn’t it? With write access to the EFI you could replace the boot loader and do whatever you please.
Unless a proper secure boot + FDE setup is in place.