Select Page

As many as 23 new high severity security vulnerabilities have been disclosed in different implementations of Unified Extensible Firmware Interface (UEFI) firmware used by numerous vendors, including Bull Atos, Fujitsu, HP, Juniper Networks, Lenovo, among others.

The vulnerabilities reside in Insyde Software’s InsydeH2O UEFI firmware, according to enterprise firmware security company¬†Binarly, with a majority of the anomalies diagnosed in the System Management Mode (SMM).

UEFI is a software specification that provides a standard programming interface connecting a computer’s firmware to its operating system during the booting process. In x86 systems, the UEFI firmware is usually stored in the flash memory chip of the motherboard.

“By exploiting these vulnerabilities, attackers can successfully install malware that survives operating system re-installations and allows the bypass of endpoint security solutions (EDR/AV),¬†Secure Boot, and Virtualization-Based Security isolation,” the researchers said.

Successful exploitation of the flaws (CVSS scores: 7.5 – 8.2) could allow a malicious actor to run arbitrary code with SMM permissions, a special-purpose execution mode in x86-based processors that handles power management, hardware configuration, thermal monitoring, and other functions.

images from Hacker News