PKfail Secure Boot bypass lets attackers install UEFI malware

Teilen:

Hundreds of UEFI products from 10 vendors are susceptible to compromise due to a critical firmware supply-chain issue known as PKfail, which allows attackers to bypass Secure Boot and install malware.

As the Binarly Research Team found, affected devices use a test Secure Boot “master key”—also known as Platform Key (PK)—generated by American Megatrends International (AMI), which was tagged as “DO NOT TRUST” and that upstream vendors should’ve replaced with their own securely generated keys.

“This Platform Key, which manages the Secure Boot databases and maintains the chain of trust from firmware to the operating system, is often not replaced by OEMs or device vendors, resulting in devices shipping with untrusted keys,” the Binarly Research Team said.

The UEFI device makers who used untrusted test keys across 813 products include Acer, Aopen, Dell, Formelife, Fujitsu, Gigabyte, HP, Intel, Lenovo, and Supermicro.

In May 2023, Binarly discovered a supply chain security incident involving leaked private keys from Intel Boot Guard, impacting multiple vendors. As first reported by BleepingComputer, the Money Message extortion gang leaked MSI source code for firmware used by the company’s motherboards.

The code contained image signing private keys for 57 MSI products and Intel Boot Guard private keys for another 116 MSI products.

Earlier this year, a private key from American Megatrends International (AMI) related to the Secure Boot “master key” was also leaked, affecting various enterprise device manufacturers. The impacted devices are still in use, and the key is being used in recently released enterprise devices.

PKfail impact and recommendations

As Binarly explains, successfully exploiting this issue allows threat actors with access to vulnerable devices and the private part of the Platform Key to bypass Secure Boot by manipulating the Key Exchange Key (KEK) database, the Signature Database (db), and the Forbidden Signature Database (dbx).

After compromising the entire security chain, from firmware to the operating system, they can sign malicious code, which allows them to deploy UEFI malware like CosmicStrand and BlackLotus.

“The first firmware vulnerable to PKfail was released back in May 2012, while the latest was released in June 2024. Overall, this makes this supply-chain issue one of the longest-lasting of its kind, spanning over 12 years,” Binarly added.

“The list of affected devices, which at the moment contains almost 900 devices, can be found in our BRLY-2024-005 advisory. A closer look at the scan results revealed that our platform extracted and identified 22 unique untrusted keys.”

To mitigate PKfail, vendors are advised to generate and manage the Platform Key by following cryptographic key management best practices, such as Hardware Security Modules.

It’s also essential to replace any test keys provided by independent BIOS vendors like AMI with their own safely generated keys.

Users should monitor firmware updates issued by device vendors and apply any security patches addressing the PKfail supply-chain issue as soon as possible.

Binarly also published the pk.fail website, which helps users scan firmware binaries for free to find PKfail-vulnerable devices and malicious payloads.

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
10:49 am, Jan. 21, 2025
Wetter-Symbol 5°C
L: 3° | H: 5°
overcast clouds
Luftfeuchtigkeit: 92 %
Druck: 1015 mb
Wind: 3 mph SW
Windböe: 6 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 100%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 7:53 am
Sonnenuntergang: 4:29 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 9:00 pm
Wetter-Symbol
3° | 5°°C 0 mm 0% 4 mph 92 % 1015 mb 0 mm/h
Tomorrow 9:00 pm
Wetter-Symbol
4° | 5°°C 1 mm 100% 5 mph 97 % 1009 mb 0 mm/h
Do. Jan. 23 9:00 pm
Wetter-Symbol
2° | 9°°C 1 mm 100% 17 mph 93 % 1008 mb 0 mm/h
Fr. Jan. 24 9:00 pm
Wetter-Symbol
6° | 11°°C 1 mm 100% 24 mph 90 % 1006 mb 0 mm/h
Sa. Jan. 25 9:00 pm
Wetter-Symbol
2° | 6°°C 1 mm 100% 12 mph 99 % 1013 mb 4.43 mm/h
Today 12:00 pm
Wetter-Symbol
5° | 5°°C 0 mm 0% 4 mph 92 % 1015 mb 0 mm/h
Today 3:00 pm
Wetter-Symbol
5° | 6°°C 0 mm 0% 3 mph 86 % 1014 mb 0 mm/h
Today 6:00 pm
Wetter-Symbol
4° | 4°°C 0 mm 0% 3 mph 85 % 1013 mb 0 mm/h
Today 9:00 pm
Wetter-Symbol
4° | 4°°C 0 mm 0% 3 mph 91 % 1011 mb 0 mm/h
Tomorrow 12:00 am
Wetter-Symbol
4° | 4°°C 0 mm 0% 3 mph 95 % 1009 mb 0 mm/h
Tomorrow 3:00 am
Wetter-Symbol
4° | 4°°C 0 mm 0% 3 mph 96 % 1007 mb 0 mm/h
Tomorrow 6:00 am
Wetter-Symbol
4° | 4°°C 0.84 mm 84% 3 mph 96 % 1005 mb 0 mm/h
Tomorrow 9:00 am
Wetter-Symbol
4° | 4°°C 1 mm 100% 3 mph 97 % 1004 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€99,377.99
-5.02%
Ethereum(ETH)
€3,174.96
-2.50%
XRP(XRP)
€2.98
-6.51%
Fesseln(USDT)
€0.96
0.01%
Solana(SOL)
€230.52
-9.12%
Dogecoin(DOGE)
€0.332786
-9.13%
USDC(USDC)
€0.97
0.02%
Shiba Inu(SHIB)
€0.000019
-5.78%
Pepe(PEPE)
€0.000014
-9.52%
Peanut das Eichhörnchen(PNUT)
€0.351267
-12.81%
Nach oben scrollen