Jump to content
  • Sign Up
×
×
  • Create New...

Firmware flaw affects numerous generations of Intel CPUs — UEFI code execution vulnerability found for Intel CPUs from 14th Gen Raptor Lake to 6th Gen Skylake CPUs, and TPM will not save you


Recommended Posts

  • Diamond Member



Firmware flaw affects numerous generations of Intel CPUs — UEFI code ********** vulnerability found for Intel CPUs from 14th Gen Raptor Lake to 6th Gen Skylake CPUs, and TPM will not save you

Using its automated binary analysis system Eclypsium Automata,

This is the hidden content, please
has uncovered the existence of high-impact security vulnerabilities in Phoenix SecureCore UEFI firmware used by a wide variety of motherboard providers and Intel CPUs spanning from 14th Gen to 6th Gen—all the “Lakes” in other words. This vulnerability also extends to several other UEFI BIOS vendors, including
This is the hidden content, please
. Phoenix is the latest to join the list.

The specific Phoenix SecureCore UEFI firmware vulnerability that prompted this posting is referred to as “UEFIcanhazbufferoverflow” by Eclypsium, which is just a funny way of pointing out that this is a buffer overflow exploit. The specific method in which the “UEFIcanhazbufferoverflow” exploit works is by using an unsafe call to the “GetVariable” UEFI service.

By making unsafe calls, a stack buffer overflow can be created, allowing for arbitrary code to be *********. In the BIOS or its modern counterpart, the UEFI, even a buffer overflow allows for full-system access and control to be gained very quickly, and the consequences of that happening can be challenging to remove from a PC permanently. Sometimes, it may even be impossible without replacing the machine entirely— and that’s not counting passwords and such that may become compromised and still need changing between machines.

Any potentially impacted Intel user should update their BIOS to protect from this issue as soon as possible, though not before creating backups of important files and the original BIOS just in case something goes wrong. Since exploits impacting UEFI are as close to Layer 0 as they get with PC hardware, it’s essential for all parties involved to act as quickly and safely as possible.

As noted by Eclypsium, this Phoenix vulnerability was discovered in a hands-off manner by its Automata security system, which is an automated binary analysis system using the research data of Eclypsium’s own researchers. While there are certainly issues with things like AI-written code and AI “generated” art, it’s always nice to see cutting-edge AI and machine learning tech put toward something useful for humanity.





This is the hidden content, please

#Firmware #flaw #affects #numerous #generations #Intel #CPUs #UEFI #code #********** #vulnerability #Intel #CPUs #14th #Gen #Raptor #Lake #6th #Gen #Skylake #CPUs #TPM #save

This is the hidden content, please

For verified travel tips and real support, visit: https://hopzone.eu/

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Unfortunately, your content contains terms that we do not allow. Please edit your content to remove the highlighted words below.
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Vote for the server

    To vote for this server you must login.

    Jim Carrey Flirting GIF

  • Recently Browsing   0 members

    • No registered users viewing this page.

Important Information

Privacy Notice: We utilize cookies to optimize your browsing experience and analyze website traffic. By consenting, you acknowledge and agree to our Cookie Policy, ensuring your privacy preferences are respected.