Just about every Windows and Linux device vulnerable to new LogoFAIL firmware attack(ars technica)
Thisars technica article describes how secure-boot firmware on a huge rangeof systems can be subverted with a malicious image file:
As its name suggests, LogoFAIL involves logos, specifically thoseof the hardware seller that are displayed on the device screenearly in the boot process, while the UEFI is still running. Imageparsers in UEFIs from all three major IBVs [independent BIOSvendors] are riddled with roughly a dozen critical vulnerabilitiesthat have gone unnoticed until now. By replacing the legitimatelogo images with identical-looking ones that have been speciallycrafted to exploit these bugs, LogoFAIL makes it possible toexecute malicious code at the most sensitive stage of the bootprocess.