Yet another SecureBoot flaw

OEMs and hardware manufacturers are at it again.

Acer, Dell, Gigabyte, Intel and Supermicro motherboards are affected. The issue? They used SecureBoot certificates meant for testing, that were literally marked “do not trust / do not ship.”

The key was created by American Megatrends International (AMI). Despite the clear name of the key, the UEFI implementers at these companies weren’t even paying attention to what they were bundling in their motherboards.

The previous folks who were discovered to do this were Aopen, Foremelife, Fujitsu, HP, Lenovo, and Supermicro. Seems like Supermicro haven’t learned their lesson.

Patch your firmware if you care about secure boot and you sign your boot payloads.

14 Likes

@PhaseLockedLoop you might be interested in this, not sure who else on the forum is a big fan of SecureBoot.

3 Likes

Seems Squirrilman got his request.

Are firmware updates available @ThatGuyB

Presumably only currently-in-support devices would receive patches?

2 Likes

Be interesting to know what ALL is affected by that. I know that the GPD WinMax2(2023) with a 7840u is affected, still trying to decide what i want to do about it.

edit: oh yeah, how would i bring this to wendel’s attention?? i know he has one too.

1 Like

Another hole found in shrodinger’s black-box called UEFI.

Just imagine what else hasn’t been discovered yet.

yikes.

9 Likes

Worth a pin.

Well well well, how the turn tables.

6 Likes

raf,360x360,075,t,fafafa_ca443f4786

20 Likes

Thats the thing: Some manufactures wont patch because the models are “old and obsolete”

6 Likes

What do you mean CoreBoot FTW?

6 Likes

I so wanted to have CoreBoot on everything but it doesnt seem practical.

I remember the recent L1T video about a quirky AliExpress mobo. I hope Wendell pushes through with his group buy and hopefully get the manufacturer to open up the mobo and hopefully wendell will get enough insights in the hardware to get it running in a Coreboot firmware.

5 Likes

In the arstechnica link, there’s 200 devices affected at the bottom, in a long list. The issue appears between 2019 and 2024, from what I could spot.

I believe Dell already patched some of them. I can’t say what patches are available for what. Check if your device is in the list and then look on your manufacturer’s website if there’s a firmware patch available.

Well, I’d suggest you do that even if your device doesn’t show up. It’s a good time to double check if you’ve got any uefi updates available.

5 years kinda pushes it barely outside of support, most products get EOL after 3 years or so, including firmware. Maybe anything, but the most critical security patches.

3 Likes

Considering that UEFI contains a complete network stack, including drivers, ethernet, DHCP, DNS, TCP, UDP, HTTP etc., readers for file systems, image file parsers, etc. I’d wager A FRICKN LOT.

Yikes indeed.

I think we should really make the boot process as simple as possible, keep the firmware as small as possible in scope, and leave all the rest to a competent user-supplied bootloader and well-documented standards. But that will probably never happen :(
9 Likes

yes hearing this was exceptionally gross to come across :face_with_peeking_eye:
the manufacturer in question had a chance to really look good considering the other primary manufacturer has been making themselves look awfully bad lately and instead, they’re like… ehhh… no.

:face_exhaling:

true, but still…what a chance for unspecified manufacturer AMD to really get some brownie points and show they care about the community…

we can dream can’t we? :sweat_smile:

They care about the data center community and render farm community, don’t they? /s

1 Like

of course!

officemoneybag

instead of

:woman_red_haired: :money_with_wings:

1 Like

Solution:

use coreboot computer as main device and lock UEFI computer inside a physical safe secured with a ubikey

Am I not seeing something when I think broken signed UEFI is still safer than BIOS style boot?

I like it. I use it and always enroll my own keys. No issues with evil maids so far.

3 Likes

That right there is where the toes get stubbed.

Secure Boot isn’t supposed to need you to do any of that, so most people don’t. Secure Boot systems don’t do that “out of the box”, they assume that the keys on the mother board are good and go from there.

Yeah, hence the Root of trust…

We are foolish to hope the vendors are trustworthy at securing the most fundamentally important part of the security chain…

Obviously the hope is misplaced

2 Likes