Article 5YB7K Hackers can infect >100 Lenovo models with unremovable malware. Are you patched?

Hackers can infect >100 Lenovo models with unremovable malware. Are you patched?

by
Dan Goodin
from Ars Technica - All content on (#5YB7K)
Lenovo-Yoga-Slim-9i_Front_Facing_conv-5-

Enlarge / This is the 14-inch variant of the Yoga Slim 9i, with leather finish. (credit: Lenovo)

Lenovo has released security updates for more than 100 laptop models to fix critical vulnerabilities that make it possible for advanced hackers to surreptitiously install malicious firmware that can be next to impossible to remove or, in some cases, to detect.

Three vulnerabilities affecting more than 1 million laptops can give hackers the ability to modify a computer's UEFI. Short for Unified Extensible Firmware Interface, the UEFI is the software that bridges a computer's device firmware with its operating system. As the first piece of software to run when virtually any modern machine is turned on, it's the initial link in the security chain. Because the UEFI resides in a flash chip on the motherboard, infections are difficult to detect and even harder to remove.

Oh, no

Two of the vulnerabilities-tracked as CVE-2021-3971 and CVE-2021-3972-reside in UEFI firmware drivers intended for use only during the manufacturing process of Lenovo consumer notebooks. Lenovo engineers inadvertently included the drivers in the production BIOS images without being properly deactivated. Hackers can exploit these buggy drivers to disable protections, including UEFI secure boot, BIOS control register bits, and protected range register, which are baked into the serial peripheral interface (SPI) and designed to prevent unauthorized changes to the firmware it runs.

Read 7 remaining paragraphs | Comments

index?i=vKnAoS0_Fps:udCouGT3BAo:V_sGLiPB index?i=vKnAoS0_Fps:udCouGT3BAo:F7zBnMyn index?d=qj6IDK7rITs index?d=yIl2AUoC8zA
External Content
Source RSS or Atom Feed
Feed Location http://feeds.arstechnica.com/arstechnica/index
Feed Title Ars Technica - All content
Feed Link https://arstechnica.com/
Reply 0 comments