If you use a Windows or Linux device, it's vulnerable to a new post-exploit attack that can remotely install an undetectable backdoor at the UEFI level. Updates from just about every vendor available today. Impressive work from @matrosov and the rest of Binarly.

https://arstechnica.com/security/2023/12/just-about-every-windows-and-linux-device-vulnerable-to-new-logofail-firmware-attack/

Just about every Windows and Linux device vulnerable to new LogoFAIL firmware attack

UEFIs booting Windows and Linux devices can be hacked by malicious logo images.

Ars Technica

@matrosov

It's 2023, and not only can malicious images still remotely execute malicious code on your devices, but they can do it at the UEFI level, during bootup, enabling invisible firmware bootkits. This new post-exploit attack, known as LogoFAIL, is mind-blowing. Amazing that an entire ecosystem comprising dozens of wealthy companies couldn't be bothered to fuzz the UEFIs they provide to billions of people. With a small amount of effort, this attack could have been closed off a decade ago.

https://arstechnica.com/security/2023/12/just-about-every-windows-and-linux-device-vulnerable-to-new-logofail-firmware-attack/

Just about every Windows and Linux device vulnerable to new LogoFAIL firmware attack

UEFIs booting Windows and Linux devices can be hacked by malicious logo images.

Ars Technica

@matrosov

Lots of people asking what the CVEs are and where announcements from various parties can be found. This is a massive, massive (un)coordinated disclosure. Lots of broken or non-existent links at the moment. I'm expecting things will straighten out in an hour or two. Please be patient.

A CERT coordination center has published an advisory on LogoFail, but unfortunately, it doesn't tell us much. It confirms that AMI, Insyde, Intel and Phoenix are affected and that Microsoft and Toshiba are not. But the remaining 20 companies are fall in the "unknown" category. One of the unknowns is Lenovo, which has already confirmed that it is affected.

Also, no CVEs.

ยฏ_(ใƒ„)_/ยฏ

https://kb.cert.org/vuls/id/811862

CERT/CC Vulnerability Note VU#811862

Image files in UEFI can be abused to modify boot behavior

@dangoodin I suspect we can count on most affected existing deployed machines never being patched for this. Firmware patches at that level are widely considered to be so risky that they are widely avoided, even for serious problems.
@dangoodin I know my @system76 uses Insyde firmware... my machine is older but I hope I get a fix ๐Ÿ™
@golemwire @dangoodin since you can't change the logo in firmware this wouldn't effect your system.
@system76 @dangoodin This is great to know โ€” thanks!
@dangoodin Great article (as usual). Although there have been a handful or two of similar UEFI vulns in the past and none of them have been widely exploited. Does this one seem different?
BIOS Image Parsing Function Vulnerabilities (LogoFAIL) - Lenovo Support AT

@dangoodin @matrosov Interesting, thanks for sharing this article. Side note: noticed ars technica is driving cookies from 143 different partners.

@dangoodin @matrosov But wait... It's even worse. I have a PC with an ASUS Z170-A motherboard. It boots using UEFI.

This link:
https://www.asus.com/us/supportonly/z170-a/helpdesk_bios/
says the last time the BIOS was updated for that motherboard was 2018.

Yes, this is an older motherboard but it works fine and does everything I need. Sure be nice if ASUS fixed such a serious problem for their older products.

Z170-A - Support

@mappingsupport @dangoodin @matrosov Same problem Iโ€™m expecting with #MSI. Similar age motherboard. Probably tons of people still have them.
@DeltaWye @mappingsupport @dangoodin @matrosov my main x86 machine has a mobo from ~2014 lmao, my server's board is from ~2016 and my laptop is from 2017, i will be incredibly pissed if they don't get patches
@dangoodin @matrosov I don't see how this could be exploited remotely. As far as I understand, a malicious image file has to make it's way onto the EFI system partition first, or did I miss something?

@fell @dangoodin @matrosov i think that's what Dan meant about a post exploit attack. You'd need to be infected/hacked via another method first, which would then establish persistence/privilege escalation via LogoFail.

Or alternatively have someone with physical access, like it says in the article

@fell @dangoodin @matrosov hai, this is h.acker, please put this image here on your disk and It will enhance your computer greatly.
@hanscees @fell @dangoodin @matrosov It doesn't even have to be a complete lie, just "put this image here" and it actually will display a picture of, idk, Harry Styles when you turn your computer on.
@carey @hanscees @dangoodin @matrosov Microsoft was wise when they decided they're not going to let Windows users access the ESP.

@fell @carey @hanscees @matrosov

Wait, what's the basis for saying Windows users can't access the ESP?

https://duckduckgo.com/?t=ffab&q=how+to+access+efi+partition+in+windows

how to access efi partition in windows at DuckDuckGo

DuckDuckGo. Privacy, Simplified.

@dangoodin @carey @hanscees @matrosov The basis is that I never saw it when I clicked on "This PC". Is it possible?
@fell @dangoodin @carey @matrosov I really dont know at this point. But if you can get a user to execute something "click here and this pic becomes your background" you can run a script and So on.
Clever people Will find a way probably

@dangoodin @matrosov
@gsuberland

8kB (IBM PC BIOS size) should've been enough for anyone :D.

@dangoodin "mind-blowing"

to me, it's just par for the cause :)

really not surprised about vulnerable graphics parsers being used with potentially attacker controlled data

@dangoodin @matrosov The fact that these seem to have been caught by fuzz tests makes me feel like sometimes there needs to be legal consequences for not doing the bare minimum in software security when it's as critical as EFI. This sounds like negligence.

@dangoodin @matrosov
Wait, so everything that goes into the secure firmware needs to be signed. Everything except the logo image? I mean, seriously??

Someone please tell me I got this wrong, because it seems like an utterly stupid thing to except the logo image from the signature.

@dangoodin @matrosov "hacked by malicious logo images" ?!?!?! Arghhh
@dangoodin oh man, pure speculation but this strikes me as a trick *someone* had to have in their back pocket.

@dangoodin @matrosov uh. ok, so.. this article and the actual blackhat summary https://www.blackhat.com/eu-23/briefings/schedule/index.html#logofail-security-implications-of-image-parsing-during-system-boot-35042
are great and all, but `is this exploit applicable to ME mr/ms end user`?

Lets assume I can google what UEFI is.
- what UEFI enabled devices are potentially exploitable? ones after <year>? UEFI 1.x? 2.0? 2.1? or all of them back to when UEFI was introduced in the late 90s as EFI or wut? A: seems like *all of em*.
- more importantly if I DONT CUSTOMIZE my bootup logo, do I need to care?

Black Hat

Black Hat

@dangoodin @matrosov the links within the article are dead. It looks like Phoenix and Insyde removed their respective pages about it. In fact, even https://www.cve.org/CVERecord?id=CVE-2023-5058 shows no information about it.
I don't understand what's going on... ๐Ÿ˜•
cve-website

@paraw @matrosov

Those links are part of a massive coordinated disclosure. Disclosures involving this many parties frequently have hicups like these in the early hours. Check the links in an hour or two and they'll likely work. If not, I'll reach out.

@dangoodin @matrosov @lisamelton I literally cannot keep up with the stream of serious security issues at any level of computers anymore.

Will we ever get good news?

@DavidNielsen @dangoodin @matrosov @lisamelton Same. My family is at the end of our collective ropes. Donโ€™t do anything sensitive on a PC. Full stop.
@dangoodin @matrosov what limits this to Windows and Linux?
@emaste @matrosov explained in the article.
@dangoodin @matrosov it explains why Windows and Linux are affected, and why macOS and smartphones aren't, but doesn't touch on OSes outside of those
@dangoodin @matrosov I think the answer is "nothing limits #LogoFAIL to Windows and Linux. Anyone with UEFI firmware should look for an update from their vendor."
@matrosov @dangoodin What are the CVEs for those defects? ๐Ÿ™๐Ÿป

@boblord @matrosov @dangoodin

From the bottom of the article:

LogoFAIL vulnerabilities are tracked under the following designations:

CVE-2023-40238
CVE-2023-5058
CVE-2023-39538
CVE-2023-39539
CVE-2023-40238

@boblord @matrosov @dangoodin for the next trick, get a hardware vendor to list a CVE in an update.
@dangoodin @matrosov so what I'm gathering is that all the PITA effort spent locking down the boot system and replacing BIOS so we barely even control our own devices was completely goddamned pointless anyways.
@llorenzin Heh, yep, this is a thing. Back in the days of Netbooks and instant boot computers they used flaws in the BIOS logo image processing (I can't find the reference though, I will look)
@dangoodin
superfluous needless shitfuck strikes back
@matrosov
@dangoodin @matrosov You know darn well the #NSA has known about this for many years and kept quiet about it so they could exploit it.
@dangoodin @matrosov use UEFI they said
It'll be more secure they said

@dangoodin (*checks multiple PCs and mobos released this year for BIOS updates from multiple vendors*)

yeah I'm not seeing anything

@dangoodin @kkarhan @matrosov if u can change the logo u can just as well change the boot loader no??
@dangoodin are device manufacturers actually pushing out updates for this or are we all just gonna be hanging around for our various boards to get some random firmware update within the next 8 months that doesn't say whether it actually fixes this
@dangoodin @matrosov My eyes glazed over half-way through. Did I understand correctly that this does nothing if "bios" (I know) is set to NOT display logo on boot-up. I always hav my machines set up that way.
@dangoodin @matrosov
And it's all down to a stupid, pointless, totally functionless LOGO IMAGE handler that merely plays to corporate vanity.
Criminally insane.

@dangoodin @matrosov

~ Oh the value of open source ~

@dangoodin @matrosov

So for a remote attack, the attacker needs root/admin access on the system. While not fool proof, if you don't use an admin account as your regular account, you're a little bit better off now (and in general) than if you are always using root/admin.

Mind boggling and yet not surprising at all, given the state of ... well... just about everything and anything.

@dangoodin @matrosov

Cool, cool. I guess it's time to limber up the old Trash 80.

@dangoodin That is some scary stuff. I have a couple of asus computers, and I didn't see any news from them about it.