Critical-BIOSUEFI-Vulnerabilities

Critical BIOS/UEFI Vulnerabilities Allow Attackers To Overwrite System Firmware

Teilen:

Researchers discovered critical BIOS/UEFI vulnerabilities in the Illumina iSeq 100 DNA sequencer, where the device utilizes an outdated firmware implementation with CSM mode lacking essential security features like Secure Boot and firmware write protections.

The vulnerability window allows attackers to exploit the system, potentially overwriting the firmware to either disable the device or install malicious code for persistent access.

Due to the presence of potential embedded malware, backdoors, and the absence of security updates, the attack surface is increased by outdated firmware and complex supply chains.

NIST guidelines for genomic information cybersecurity emphasize the crucial role of hardware and software security, recommending stringent configuration management and integrity checks for such systems to mitigate these risks.

Over the past decade, attackers have increasingly targeted BIOS/UEFI firmware, exploiting supply chain vulnerabilities and compromising devices in the field which has led to a surge in firmware-based attacks, including ransomware.

In response, technology vendors have implemented various security measures, such as secure boot, platform integrity checks, and remote attestation.

While attackers have continued to adapt, leveraging sophisticated techniques like malicious firmware updates, bootkit infections, and hardware Trojans to circumvent these defenses.

The iSeq 100 device exhibits several critical security vulnerabilities by utilizing Compatibility Support Mode (CSM) instead of the more secure UEFI, allowing it to boot legacy BIOS firmware and potentially introducing compatibility issues and security risks.

<img class="”i-amphtml-intrinsic-sizer”" style="”box-sizing:" border-box; margin: 0px; padding: border: outline: font-size: 18px; vertical-align: baseline; background: transparent; max-width: 100%; display: block !important; object-fit: contain;” role ="”presentation”" src ="”data:;base64,”" alt ="””" aria-hidden="”true”" />
Critical BIOS/UEFI Vulnerabilities Allow Attackers To Overwrite System Firmware 1

It also runs on an outdated BIOS version with known vulnerabilities and lacks essential firmware protections. Read/Write protections are disabled, enabling attackers to freely modify the device’s firmware.

The absence of Secure Boot makes it possible for malicious firmware modifications to go undetected, which significantly increases the risk of compromise.

Exploiting the Vulnerability

Exploiting the RCE vulnerability could grant attackers remote code execution, allowing them to modify firmware arbitrarily, which includes potentially bricking the device, a simpler attack than manipulating test results.

<img class="”i-amphtml-intrinsic-sizer”" style="”box-sizing:" border-box; margin: 0px; padding: border: outline: font-size: 18px; vertical-align: baseline; background: transparent; max-width: 100%; display: block !important; object-fit: contain;” role ="”presentation”" src ="”data:;base64,”" alt ="””" aria-hidden="”true”" />

Within its software guidance, the Food and Drug Administration (FDA) emphasizes the significance of securing all software on devices, including firmware.

To address this, vendors must rigorously assess components from their suppliers and healthcare organizations need tools to evaluate the security of devices before deployment, which requires a shift towards comprehensive firmware security assessments to mitigate risks and ensure the integrity of medical devices.

Prior research has demonstrated the vulnerability of BIOS/UEFI in traditional devices, leading to successful exploitation by adversaries like Hacking Team, LoJax, and MosaicRegressor.

According to the Eclypsium report, the trend extends to non-standard devices, with attackers targeting firmware in network, application, and IoT devices to gain initial access or maintain a persistent presence.

The iSeq 100, a critical device in healthcare and research, is susceptible to similar attacks. Compromised firmware on the iSeq 100 could enable attackers to disrupt operations through device disablement, impacting critical research and potentially serving geopolitical or financial motives.

As all subsequent software layers rely on the integrity of firmware, its compromise severely undermines overall device security.

Just as life scientists utilize tools to analyze DNA for vulnerabilities, IT and security teams necessitate specialized tools to assess the fundamental firmware code for potential weaknesses, ensuring the robust security of the underlying technology.

Quelle

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
10:37 pm, Juli 5, 2025
Wetter-Symbol 20°C
L: 18° | H: 21°
broken clouds
Luftfeuchtigkeit: 78 %
Druck: 1011 mb
Wind: 10 mph WSW
Windböe: 0 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 75%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 4:50 am
Sonnenuntergang: 9:19 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Tomorrow 10:00 pm
Wetter-Symbol
18° | 21°°C 1 mm 100% 11 mph 85 % 1010 mb 0 mm/h
Mo. Juli 07 10:00 pm
Wetter-Symbol
13° | 20°°C 1 mm 100% 13 mph 92 % 1015 mb 0 mm/h
Di. Juli 08 10:00 pm
Wetter-Symbol
13° | 24°°C 0 mm 0% 11 mph 78 % 1020 mb 0 mm/h
Mi. Juli 09 10:00 pm
Wetter-Symbol
15° | 26°°C 0 mm 0% 7 mph 67 % 1022 mb 0 mm/h
Do. Juli 10 10:00 pm
Wetter-Symbol
18° | 30°°C 0 mm 0% 5 mph 55 % 1023 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
19° | 19°°C 0 mm 0% 8 mph 79 % 1010 mb 0 mm/h
Tomorrow 4:00 am
Wetter-Symbol
18° | 18°°C 0 mm 0% 6 mph 85 % 1009 mb 0 mm/h
Tomorrow 7:00 am
Wetter-Symbol
20° | 20°°C 0 mm 0% 7 mph 80 % 1006 mb 0 mm/h
Tomorrow 10:00 am
Wetter-Symbol
19° | 19°°C 1 mm 100% 7 mph 85 % 1005 mb 0 mm/h
Tomorrow 1:00 pm
Wetter-Symbol
19° | 19°°C 1 mm 100% 9 mph 79 % 1005 mb 0 mm/h
Tomorrow 4:00 pm
Wetter-Symbol
19° | 19°°C 1 mm 100% 10 mph 77 % 1005 mb 0 mm/h
Tomorrow 7:00 pm
Wetter-Symbol
21° | 21°°C 1 mm 100% 11 mph 53 % 1005 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
18° | 18°°C 0.44 mm 44% 9 mph 60 % 1007 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€91,803.20
0.34%
Ethereum(ETH)
€2,136.11
1.05%
Fesseln(USDT)
€0.85
0.01%
XRP(XRP)
€1.88
-0.15%
Solana(SOL)
€125.07
0.44%
USDC(USDC)
€0.85
0.00%
Dogecoin(DOGE)
€0.139324
1.15%
Shiba Inu(SHIB)
€0.000009
1.07%
Pepe(PEPE)
€0.000008
1.37%
Nach oben scrollen