Chewy to Linux@lemmy.ml • 1 year agoJust about every Windows and Linux device vulnerable to new LogoFAIL firmware attackarstechnica.comexternal-linkmessage-square105fedilinkarrow-up1368arrow-down114cross-posted to: technology@hexbear.netcybersecurity@lemmy.mlnews@lemmy.linuxuserspace.showtechnology@lemmy.worldtecnologia@feddit.clhackernews@derp.foohackernews@lemmy.smeargle.fanstechnology@lemmy.zipprivacy@lemmy.ml
arrow-up1354arrow-down1external-linkJust about every Windows and Linux device vulnerable to new LogoFAIL firmware attackarstechnica.comChewy to Linux@lemmy.ml • 1 year agomessage-square105fedilinkcross-posted to: technology@hexbear.netcybersecurity@lemmy.mlnews@lemmy.linuxuserspace.showtechnology@lemmy.worldtecnologia@feddit.clhackernews@derp.foohackernews@lemmy.smeargle.fanstechnology@lemmy.zipprivacy@lemmy.ml
minus-square@deadcade@lemmy.deadca.delinkfedilink45•1 year agoSince the EFI partition is unencrypted, physical access would do the trick here too, even with every firmware/software security measure.
minus-square@_edge@discuss.tchncs.delinkfedilink23•1 year agoTrue, but this was the case without this finding, wasn’t it? With write access to the EFI you could replace the boot loader and do whatever you please.
minus-square@deadcade@lemmy.deadca.delinkfedilink3•1 year agoUnless a proper secure boot + FDE setup is in place.
Since the EFI partition is unencrypted, physical access would do the trick here too, even with every firmware/software security measure.
True, but this was the case without this finding, wasn’t it? With write access to the EFI you could replace the boot loader and do whatever you please.
Unless a proper secure boot + FDE setup is in place.