F5F Stay Refreshed Hardware Desktop Vulnerability in BIOS being used to gain access

Vulnerability in BIOS being used to gain access

Vulnerability in BIOS being used to gain access

Pages (3): 1 2 3 Next
A
anemto
Member
132
10-17-2023, 03:18 AM
#1
Most Windows and Linux systems exposed to the LogoFAIL firmware vulnerability have security layers that prevent detection or removal. The latest update was shared on December 7 at 3:39 PM, noting that BIOS patches were supposed to be released yesterday. Online searches show no such announcements. By Wednesday, the situation was likely addressed, and I contacted Asus' support to report the issue. Expect a reply within 24-48 hours. Updated by RevGAM on December 7, 2023.
A
anemto
10-17-2023, 03:18 AM #1

Most Windows and Linux systems exposed to the LogoFAIL firmware vulnerability have security layers that prevent detection or removal. The latest update was shared on December 7 at 3:39 PM, noting that BIOS patches were supposed to be released yesterday. Online searches show no such announcements. By Wednesday, the situation was likely addressed, and I contacted Asus' support to report the issue. Expect a reply within 24-48 hours. Updated by RevGAM on December 7, 2023.

Q
Queen_Cookie
Junior Member
6
11-08-2023, 12:37 AM
#2
Most devices today support UEFI, but many older systems still run BIOS. Whether from outdated hardware or newer setups, users often stick with BIOS instead of UEFI. Additionally, some UEFI boards let you turn off custom logos during startup, which could resolve this problem.
Q
Queen_Cookie
11-08-2023, 12:37 AM #2

Most devices today support UEFI, but many older systems still run BIOS. Whether from outdated hardware or newer setups, users often stick with BIOS instead of UEFI. Additionally, some UEFI boards let you turn off custom logos during startup, which could resolve this problem.

M
mcDavoz
Senior Member
544
11-08-2023, 03:34 AM
#3
I'm curious about whether it might run a command to remove the system32 folder.
M
mcDavoz
11-08-2023, 03:34 AM #3

I'm curious about whether it might run a command to remove the system32 folder.

C
Carsland123
Senior Member
398
11-28-2023, 05:55 AM
#4
There are two main scenarios: either the firmware is compromised due to a bad BIOS update or a breach, or an attacker has already gained access and modified the device. In the first case, you're safe regardless since the trust chain is broken. In the second, being compromised already makes it irrelevant to try more malware. This kind of media decoding vulnerability isn't rare—see this article about Chrome and Firefox issues: https://arstechnica.com/security/2023/09...r-software
C
Carsland123
11-28-2023, 05:55 AM #4

There are two main scenarios: either the firmware is compromised due to a bad BIOS update or a breach, or an attacker has already gained access and modified the device. In the first case, you're safe regardless since the trust chain is broken. In the second, being compromised already makes it irrelevant to try more malware. This kind of media decoding vulnerability isn't rare—see this article about Chrome and Firefox issues: https://arstechnica.com/security/2023/09...r-software

P
peyesta
Member
212
11-28-2023, 06:21 AM
#5
Ensure no remote admin rights are granted to anyone, which should keep you safe—even in games with full system access and anti-cheat features like Valorant.
P
peyesta
11-28-2023, 06:21 AM #5

Ensure no remote admin rights are granted to anyone, which should keep you safe—even in games with full system access and anti-cheat features like Valorant.

D
Darkfall48
Junior Member
2
12-11-2023, 09:24 PM
#6
Remote admin rights aren't required to breach and compromise a system. No-click methods are also ineffective.
D
Darkfall48
12-11-2023, 09:24 PM #6

Remote admin rights aren't required to breach and compromise a system. No-click methods are also ineffective.

G
gloc
Junior Member
12
12-31-2023, 11:26 PM
#7
I understand this relates to the logofail flaw where privileged PowerShell is used.
G
gloc
12-31-2023, 11:26 PM #7

I understand this relates to the logofail flaw where privileged PowerShell is used.

K
Kitten645321
Member
181
01-01-2024, 02:39 PM
#8
It was achieved by taking advantage of browser weaknesses and then gaining higher system permissions.
K
Kitten645321
01-01-2024, 02:39 PM #8

It was achieved by taking advantage of browser weaknesses and then gaining higher system permissions.

B
BlueZoisite
Junior Member
19
01-04-2024, 02:09 AM
#9
It's worth noting that the assumption about disabling the system before infection is key. Once access is gained, the situation changes little. There are additional weaknesses not discussed here... Do you have any idea what share of users skip UEFI? According to the article, once inside and privileges obtained, simply placing the infected image on the ESP is enough. The method used doesn't affect detection in BIOS or the operating system. Yes, it's crucial because LogoFail provides a backdoor for unrestricted actions. It enables the installation of various tools as needed. Regardless of how it's introduced, the trust chain is broken. It doesn't matter whether it happens remotely or on-site—it's already complete. The only solution is updating the firmware. Clearing the infection from memory won't help since it will be reloaded at startup. Anyone using UEFI is at risk, except for most Dell models and Apple devices.
B
BlueZoisite
01-04-2024, 02:09 AM #9

It's worth noting that the assumption about disabling the system before infection is key. Once access is gained, the situation changes little. There are additional weaknesses not discussed here... Do you have any idea what share of users skip UEFI? According to the article, once inside and privileges obtained, simply placing the infected image on the ESP is enough. The method used doesn't affect detection in BIOS or the operating system. Yes, it's crucial because LogoFail provides a backdoor for unrestricted actions. It enables the installation of various tools as needed. Regardless of how it's introduced, the trust chain is broken. It doesn't matter whether it happens remotely or on-site—it's already complete. The only solution is updating the firmware. Clearing the infection from memory won't help since it will be reloaded at startup. Anyone using UEFI is at risk, except for most Dell models and Apple devices.

T
TmineCraft34
Member
121
01-04-2024, 04:55 AM
#10
The situation remains critical regardless of the attacker's approach. It matters because the system must already be compromised before an infected image can be introduced. A non-infected setup cannot be affected by logofail alone—unless the firmware itself was tampered with, such as downloading a corrupted version or receiving a compromised device. In the second scenario, the malicious image in the ESP can be easily removed. A straightforward system format should be enough to overwrite the ESP. This applies even if Dell is also affected, as highlighted in the article.
T
TmineCraft34
01-04-2024, 04:55 AM #10

The situation remains critical regardless of the attacker's approach. It matters because the system must already be compromised before an infected image can be introduced. A non-infected setup cannot be affected by logofail alone—unless the firmware itself was tampered with, such as downloading a corrupted version or receiving a compromised device. In the second scenario, the malicious image in the ESP can be easily removed. A straightforward system format should be enough to overwrite the ESP. This applies even if Dell is also affected, as highlighted in the article.

Pages (3): 1 2 3 Next