Chewy@discuss.tchncs.de to Linux@lemmy.ml · 11 months agoJust about every Windows and Linux device vulnerable to new LogoFAIL firmware attackarstechnica.comexternal-linkmessage-square103fedilinkarrow-up1368arrow-down114cross-posted to: technology@hexbear.netcybersecurity@lemmy.mltechnology@lemmy.worldhackernews@derp.footechnology@lemmy.ziptechnology@lemmit.onlineprivacy@lemmy.ml
arrow-up1354arrow-down1external-linkJust about every Windows and Linux device vulnerable to new LogoFAIL firmware attackarstechnica.comChewy@discuss.tchncs.de to Linux@lemmy.ml · 11 months agomessage-square103fedilinkcross-posted to: technology@hexbear.netcybersecurity@lemmy.mltechnology@lemmy.worldhackernews@derp.footechnology@lemmy.ziptechnology@lemmit.onlineprivacy@lemmy.ml
minus-squaredeadcade@lemmy.deadca.delinkfedilinkarrow-up45·11 months agoSince the EFI partition is unencrypted, physical access would do the trick here too, even with every firmware/software security measure.
minus-square_edge@discuss.tchncs.delinkfedilinkarrow-up23·11 months agoTrue, but this was the case without this finding, wasn’t it? With write access to the EFI you could replace the boot loader and do whatever you please.
minus-squaredeadcade@lemmy.deadca.delinkfedilinkarrow-up3·11 months agoUnless a proper secure boot + FDE setup is in place.
Since the EFI partition is unencrypted, physical access would do the trick here too, even with every firmware/software security measure.
True, but this was the case without this finding, wasn’t it? With write access to the EFI you could replace the boot loader and do whatever you please.
Unless a proper secure boot + FDE setup is in place.