Chewy@discuss.tchncs.de to Linux@lemmy.ml · 1 year agoJust about every Windows and Linux device vulnerable to new LogoFAIL firmware attackarstechnica.comexternal-linkmessage-square106fedilinkarrow-up1368arrow-down114cross-posted to: technology@hexbear.netcybersecurity@lemmy.mltechnology@lemmy.worldhackernews@derp.footechnology@lemmy.zip
arrow-up1354arrow-down1external-linkJust about every Windows and Linux device vulnerable to new LogoFAIL firmware attackarstechnica.comChewy@discuss.tchncs.de to Linux@lemmy.ml · 1 year agomessage-square106fedilinkcross-posted to: technology@hexbear.netcybersecurity@lemmy.mltechnology@lemmy.worldhackernews@derp.footechnology@lemmy.zip
minus-squaredeadcade@lemmy.deadca.delinkfedilinkarrow-up45·1 year agoSince the EFI partition is unencrypted, physical access would do the trick here too, even with every firmware/software security measure.
minus-square_edge@discuss.tchncs.delinkfedilinkarrow-up23·1 year agoTrue, but this was the case without this finding, wasn’t it? With write access to the EFI you could replace the boot loader and do whatever you please.
minus-squaredeadcade@lemmy.deadca.delinkfedilinkarrow-up3·1 year agoUnless a proper secure boot + FDE setup is in place.
Since the EFI partition is unencrypted, physical access would do the trick here too, even with every firmware/software security measure.
True, but this was the case without this finding, wasn’t it? With write access to the EFI you could replace the boot loader and do whatever you please.
Unless a proper secure boot + FDE setup is in place.