Secure Boot has been compromised on more than 200 PC models from major manufacturers, and this is just the beginning

Cybersecurity experts at Binarly have discovered that the Secure Boot protocol used in UEFI firmware has been compromised on more than 200 PC models and servers from the world’s largest manufacturers. The cause of the problem is said to be the irresponsible attitude of manufacturers towards managing cryptographic keys that provide Secure Boot protection.

Image source: Pete Linforth / pixabay.com

Secure Boot technology became an industry standard in 2012, when it was realized that malware could emerge that could infect the BIOS, a set of low-level firmware that runs before the operating system boots. The day before, researchers from Binarly announced that the Secure Boot protocol was completely compromised on more than 200 computer models manufactured under the brands Acer, Dell, Gigabyte, Intel and Supermicro, because in 2022 a cryptographic key that ensures trust was compromised in one of the GitHub repositories between the computer hardware and the firmware running on it. Binarly researchers discovered the leak in January 2023.

It soon became clear that more than 300 more computer models from almost all major manufacturers were at risk – another 21 keys were discovered marked “DO NOT SHIP” (“Do not ship”) and “DO NOT TRUST” (“Do not trust”). These keys were created by AMI (American Megatrends Incorporated), one of the three largest software developers that helps hardware manufacturers create their own UEFI firmware for specific configurations. The markings indicate that these keys were not intended for use on production products – they were supplied by AMI to current or potential customers for testing, but were actually used on production products. The problem affected Aopen, Foremelife, Fujitsu, HP, Lenovo and Supermicro.

Image source: Gerd Altmann / pixabay.com

Security experts recommend that these cryptographic keys be unique for each product line or, at a minimum, for each manufacturer. And ideally, they should even be changed from time to time. In reality, the keys discovered by Binarly were used by more than a dozen different manufacturers for over a decade. Identical test keys were found in both consumer PCs and servers; and at least one was used by three different manufacturers. The company titled its discovery PKfail to highlight the failure of the entire industry to properly manage encryption keys, resulting in a threat to the entire supply chain. Bypassing Secure Boot protection means the ability to run any executable files on a vulnerable machine before the OS loads.

Incidents of a smaller scale have been reported before. In 2016, an AMI key marked “DO NOT TRUST” was discovered in Lenovo products; then the vulnerability CVE-2016-5242 was registered. Last year, Money Message hackers stole two MSI keys, putting 57 of the company’s laptop models at risk. Ars Technica sent inquiries to the companies mentioned in connection with PKfail and did not receive responses from all of them. Only Supermicro said they solved the problem by releasing BIOS updates. Intel, HP, Lenovo and Fujitsu gave very similar responses, noting that the potentially vulnerable products have already been discontinued, sold and no longer supported. Binarly published a complete list of vulnerable products on GitHub.

admin

Share
Published by
admin

Recent Posts

Alibaba Cloud Reduces Data Center Assembly Time by 50% Using Modular Architecture

Alibaba Cloud presented at its annual Apsara conference a modular data center architecture called “CUBE…

14 mins ago

The release has crept up unnoticed: the classic version of Resident Evil 3 will appear on GOG very soon

The original Resident Evil 3: Nemesis turned 25 years old yesterday, and the digital distribution…

43 mins ago

Biden and Modi agreed to build a chip factory in India

The United States and India have reached an agreement under which a new semiconductor manufacturing…

1 hour ago

An insider has revealed the main source of inspiration for the multiplayer Assassin’s Creed Invictus – Fall Guys

Image Source: Mediatonic Among the available formats are team deathmatch, every man for himself, and…

3 hours ago

Seasonic has released a PRIME PX-2200 power supply with a power of 2200 W for $500

Seasonic has released the PRIME PX-2200 2200 W power supply. The new product was first…

3 hours ago