Chewy@discuss.tchncs.de to Linux@lemmy.ml · 10 个月前Just about every Windows and Linux device vulnerable to new LogoFAIL firmware attackarstechnica.comexternal-linkmessage-square103fedilinkarrow-up1368arrow-down114cross-posted to: cybersecurity@lemmy.mlnews@lemmy.linuxuserspace.showtechnology@lemmy.worldhackernews@lemmy.smeargle.fans
arrow-up1354arrow-down1external-linkJust about every Windows and Linux device vulnerable to new LogoFAIL firmware attackarstechnica.comChewy@discuss.tchncs.de to Linux@lemmy.ml · 10 个月前message-square103fedilinkcross-posted to: cybersecurity@lemmy.mlnews@lemmy.linuxuserspace.showtechnology@lemmy.worldhackernews@lemmy.smeargle.fans
minus-squaredeadcade@lemmy.deadca.delinkfedilinkarrow-up45·10 个月前Since the EFI partition is unencrypted, physical access would do the trick here too, even with every firmware/software security measure.
minus-square_edge@discuss.tchncs.delinkfedilinkarrow-up23·10 个月前True, but this was the case without this finding, wasn’t it? With write access to the EFI you could replace the boot loader and do whatever you please.
minus-squaredeadcade@lemmy.deadca.delinkfedilinkarrow-up3·10 个月前Unless a proper secure boot + FDE setup is in place.
Since the EFI partition is unencrypted, physical access would do the trick here too, even with every firmware/software security measure.
True, but this was the case without this finding, wasn’t it? With write access to the EFI you could replace the boot loader and do whatever you please.
Unless a proper secure boot + FDE setup is in place.