Jump to content

Welcome to ExtremeHW

Welcome to ExtremeHW, register to take part in our community, don't worry this is a simple FREE process that requires minimal information for you to signup.

 

Registered users can: 

  • Start new topics and reply to others.
  • Show off your PC using our Rig Creator feature.
  • Subscribe to topics and forums to get updates.
  • Get your own profile page to customize.
  • Send personal messages to other members.
  • Take advantage of site exclusive features.
  • Upgrade to Premium to unlock additional sites features.
IGNORED

AMD motherboard partners start rolling out BIOS updates with LogoFAIL bugfix


ENTERPRISE

Recommended Posts

  Quote

Thanks to AMD's AGESA updates, its motherboard partners have started rolling out BIOS updates containing a fix to protect the BIOS from LogoFAIL, a security flaw that allows the UEFI boot screen to be hijacked. LogoFAIL was discovered in Dec. 2023. 

Expand  

Source

  • Thanks 3

£3000

Owned

 Share

CPU: AMD Ryzen 9 7950X3D
MOTHERBOARD: MSI Meg Ace X670E
RAM: Corsair Dominator Titanium 64GB (6000MT/s)
GPU: EVGA 3090 FTW Ultra Gaming
SSD/NVME: Corsair MP700 Pro SE Gen 5 4TB
PSU: EVGA Supernova T2 1600Watt
CASE: be quiet Dark Base Pro 900 Rev 2
FANS: Noctua NF-A14 industrialPPC x 6
Full Rig Info

Link to comment
Share on other sites

LogoFAIL is a set of security vulnerabilities affecting different image parsing libraries used in the system firmware by various vendors during the device boot process. It impacts devices by placing malicious code inside an image file that is parsed during boot, leading to persistence1. Here are some key points about LogoFAIL:

  1. What Is LogoFAIL?

  2. How It Works:

    • LogoFAIL involves hardware seller logos displayed on the device screen during the boot process while the UEFI is still running.
    • Image parsers in UEFIs from major vendors are riddled with roughly a dozen critical vulnerabilities that have gone unnoticed until now.
    • By replacing legitimate logo images with identical-looking ones specially crafted to exploit these bugs, LogoFAIL enables the execution of malicious code at the most sensitive stage of the boot process (known as DXE, short for Driver Execution Environment).
  3. Scope and Impact:

    • Hundreds of Windows and Linux computer models from virtually all hardware makers are vulnerable to LogoFAIL.
    • The attack can be remotely executed in post-exploit situations, using techniques that can’t be easily spotted by traditional endpoint security products.
    • Exploits run during the earliest stages of the boot process, bypassing defenses like Secure Boot and similar protections designed to prevent bootkit infections.
  4. Affected Parties:

  5. Protection and Mitigation:

Remember, LogoFAIL is not a virus but rather a set of vulnerabilities that allow attackers to bypass security measures and install malicious software during the boot process4. Stay vigilant and keep your devices secure! 🛡️🔒

 
 
  • Thanks 2
  • Respect 3

null

Owned

 Share

CPU: 5800x
MOTHERBOARD: ASUS TUF Gaming B550-Plus
RAM: 32GB 3600mhz CL16
GPU: 7900XT
SOUNDCARD: Sound Blaster Z 5.1 home theater
MONITOR: 4K 65 inch TV
Full Rig Info
Link to comment
Share on other sites

  On 14/04/2024 at 05:35, UltraMega said:

LogoFAIL is a set of security vulnerabilities affecting different image parsing libraries used in the system firmware by various vendors during the device boot process. It impacts devices by placing malicious code inside an image file that is parsed during boot, leading to persistence1. Here are some key points about LogoFAIL:

  1. What Is LogoFAIL?

  2. How It Works:

    • LogoFAIL involves hardware seller logos displayed on the device screen during the boot process while the UEFI is still running.
    • Image parsers in UEFIs from major vendors are riddled with roughly a dozen critical vulnerabilities that have gone unnoticed until now.
    • By replacing legitimate logo images with identical-looking ones specially crafted to exploit these bugs, LogoFAIL enables the execution of malicious code at the most sensitive stage of the boot process (known as DXE, short for Driver Execution Environment).
  3. Scope and Impact:

    • Hundreds of Windows and Linux computer models from virtually all hardware makers are vulnerable to LogoFAIL.
    • The attack can be remotely executed in post-exploit situations, using techniques that can’t be easily spotted by traditional endpoint security products.
    • Exploits run during the earliest stages of the boot process, bypassing defenses like Secure Boot and similar protections designed to prevent bootkit infections.
  4. Affected Parties:

  5. Protection and Mitigation:

Remember, LogoFAIL is not a virus but rather a set of vulnerabilities that allow attackers to bypass security measures and install malicious software during the boot process4. Stay vigilant and keep your devices secure! 🛡️🔒

 
 
Expand  

Thanks ChatGPT!

  • Thanks 1
  • Hilarious 2
  • Agreed 1

null

Showcase

 Share

CPU: AMD Ryzen 9 5900X
GPU: Nvidia RTX 3080 Ti Founders Edition
RAM: G.Skill Trident Z Neo 32GB DDR4-3600 (@ 3733 CL14)
MOTHERBOARD: ASUS Crosshair VIII Dark Hero
SSD/NVME: x2 Samsung 970 Evo Plus 2TB
SSD/NVME 2: Crucial MX500 1TB
PSU: be Quiet! Straight Power 12 1500W
MONITOR: LG 42" C4 OLED
Full Rig Info
Link to comment
Share on other sites

  On 14/04/2024 at 14:26, Sir Beregond said:

Thanks ChatGPT!

Expand  

Hey, it's useful for summaries if nothing else. 

  • Agreed 1

null

Owned

 Share

CPU: 5800x
MOTHERBOARD: ASUS TUF Gaming B550-Plus
RAM: 32GB 3600mhz CL16
GPU: 7900XT
SOUNDCARD: Sound Blaster Z 5.1 home theater
MONITOR: 4K 65 inch TV
Full Rig Info
Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...

Important Information

This Website may place and access certain Cookies on your computer. ExtremeHW uses Cookies to improve your experience of using the Website and to improve our range of products and services. ExtremeHW has carefully chosen these Cookies and has taken steps to ensure that your privacy is protected and respected at all times. All Cookies used by this Website are used in accordance with current UK and EU Cookie Law. For more information please see our Privacy Policy