Critical-BIOSUEFI-Vulnerabilities

Critical BIOS/UEFI Vulnerabilities Allow Attackers To Overwrite System Firmware

Teilen:

Researchers discovered critical BIOS/UEFI vulnerabilities in the Illumina iSeq 100 DNA sequencer, where the device utilizes an outdated firmware implementation with CSM mode lacking essential security features like Secure Boot and firmware write protections.

The vulnerability window allows attackers to exploit the system, potentially overwriting the firmware to either disable the device or install malicious code for persistent access.

Due to the presence of potential embedded malware, backdoors, and the absence of security updates, the attack surface is increased by outdated firmware and complex supply chains.

NIST guidelines for genomic information cybersecurity emphasize the crucial role of hardware and software security, recommending stringent configuration management and integrity checks for such systems to mitigate these risks.

Over the past decade, attackers have increasingly targeted BIOS/UEFI firmware, exploiting supply chain vulnerabilities and compromising devices in the field which has led to a surge in firmware-based attacks, including ransomware.

In response, technology vendors have implemented various security measures, such as secure boot, platform integrity checks, and remote attestation.

While attackers have continued to adapt, leveraging sophisticated techniques like malicious firmware updates, bootkit infections, and hardware Trojans to circumvent these defenses.

The iSeq 100 device exhibits several critical security vulnerabilities by utilizing Compatibility Support Mode (CSM) instead of the more secure UEFI, allowing it to boot legacy BIOS firmware and potentially introducing compatibility issues and security risks.

<img class="”i-amphtml-intrinsic-sizer”" style="”box-sizing:" border-box; margin: 0px; padding: border: outline: font-size: 18px; vertical-align: baseline; background: transparent; max-width: 100%; display: block !important; object-fit: contain;” role ="”presentation”" src ="”data:;base64,”" alt ="””" aria-hidden="”true”" />
Critical BIOS/UEFI Vulnerabilities Allow Attackers To Overwrite System Firmware 1

It also runs on an outdated BIOS version with known vulnerabilities and lacks essential firmware protections. Read/Write protections are disabled, enabling attackers to freely modify the device’s firmware.

The absence of Secure Boot makes it possible for malicious firmware modifications to go undetected, which significantly increases the risk of compromise.

Exploiting the Vulnerability

Exploiting the RCE vulnerability could grant attackers remote code execution, allowing them to modify firmware arbitrarily, which includes potentially bricking the device, a simpler attack than manipulating test results.

<img class="”i-amphtml-intrinsic-sizer”" style="”box-sizing:" border-box; margin: 0px; padding: border: outline: font-size: 18px; vertical-align: baseline; background: transparent; max-width: 100%; display: block !important; object-fit: contain;” role ="”presentation”" src ="”data:;base64,”" alt ="””" aria-hidden="”true”" />

Within its software guidance, the Food and Drug Administration (FDA) emphasizes the significance of securing all software on devices, including firmware.

To address this, vendors must rigorously assess components from their suppliers and healthcare organizations need tools to evaluate the security of devices before deployment, which requires a shift towards comprehensive firmware security assessments to mitigate risks and ensure the integrity of medical devices.

Prior research has demonstrated the vulnerability of BIOS/UEFI in traditional devices, leading to successful exploitation by adversaries like Hacking Team, LoJax, and MosaicRegressor.

According to the Eclypsium report, the trend extends to non-standard devices, with attackers targeting firmware in network, application, and IoT devices to gain initial access or maintain a persistent presence.

The iSeq 100, a critical device in healthcare and research, is susceptible to similar attacks. Compromised firmware on the iSeq 100 could enable attackers to disrupt operations through device disablement, impacting critical research and potentially serving geopolitical or financial motives.

As all subsequent software layers rely on the integrity of firmware, its compromise severely undermines overall device security.

Just as life scientists utilize tools to analyze DNA for vulnerabilities, IT and security teams necessitate specialized tools to assess the fundamental firmware code for potential weaknesses, ensuring the robust security of the underlying technology.

Quelle

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
4:34 am, Juni 8, 2025
Wetter-Symbol 9°C
L: 8° | H: 10°
klarer Himmel
Luftfeuchtigkeit: 87 %
Druck: 1011 mb
Wind: 7 mph NW
Windböe: 12 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 5%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 4:44 am
Sonnenuntergang: 9:14 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 10:00 pm
Wetter-Symbol
8° | 10°°C 0 mm 0% 12 mph 84 % 1021 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
10° | 18°°C 0 mm 0% 8 mph 85 % 1022 mb 0 mm/h
Di. Juni 10 10:00 pm
Wetter-Symbol
12° | 21°°C 0 mm 0% 10 mph 85 % 1020 mb 0 mm/h
Mi. Juni 11 10:00 pm
Wetter-Symbol
14° | 26°°C 0 mm 0% 9 mph 91 % 1020 mb 0 mm/h
Do. Juni 12 10:00 pm
Wetter-Symbol
18° | 24°°C 0.47 mm 47% 13 mph 78 % 1015 mb 0 mm/h
Today 7:00 am
Wetter-Symbol
9° | 10°°C 0 mm 0% 10 mph 84 % 1012 mb 0 mm/h
Today 10:00 am
Wetter-Symbol
13° | 14°°C 0 mm 0% 12 mph 65 % 1015 mb 0 mm/h
Today 1:00 pm
Wetter-Symbol
17° | 17°°C 0 mm 0% 11 mph 44 % 1018 mb 0 mm/h
Today 4:00 pm
Wetter-Symbol
17° | 17°°C 0 mm 0% 9 mph 51 % 1019 mb 0 mm/h
Today 7:00 pm
Wetter-Symbol
18° | 18°°C 0 mm 0% 10 mph 55 % 1019 mb 0 mm/h
Today 10:00 pm
Wetter-Symbol
13° | 13°°C 0 mm 0% 7 mph 73 % 1021 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
12° | 12°°C 0 mm 0% 7 mph 80 % 1021 mb 0 mm/h
Tomorrow 4:00 am
Wetter-Symbol
10° | 10°°C 0 mm 0% 6 mph 85 % 1021 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€92,495.99
0.69%
Ethereum(ETH)
€2,203.40
0.99%
Fesseln(USDT)
€0.88
-0.03%
XRP(XRP)
€1.90
-0.11%
Solana(SOL)
€131.38
0.76%
USDC(USDC)
€0.88
0.00%
Dogecoin(DOGE)
€0.161160
1.04%
Shiba Inu(SHIB)
€0.000011
0.63%
Pepe(PEPE)
€0.000011
1.76%
Peanut das Eichhörnchen(PNUT)
€0.234364
7.64%
Nach oben scrollen