Article 56AA1 New flaw neuters Secure Boot, but there’s no reason to panic. Here’s why

New flaw neuters Secure Boot, but there’s no reason to panic. Here’s why

by
Dan Goodin
from Ars Technica - All content on (#56AA1)
grub2-boot-worm-800x450.jpg

Enlarge (credit: Aurich Lawson / Getty Images)

GRUB2, one of the world's most-widely used programs for booting up computers, has a vulnerability that can make it easier for attackers to run malicious firmware during startup, researchers said on Wednesday. This would affect millions or possibly hundreds of millions of machines. While GRUB2 is mainly used in computers running Linux, attacks that exploit the vulnerability can be performed on many PCs running Windows as well.

The vulnerability, discovered by researchers from security firm Eclypsium, poses yet another serious threat to UEFI Secure Boot, an industry-wide standard that uses cryptographic signatures to ensure that software used during startup is trusted by a computer's manufacturer. Secure Boot was designed to prevent attackers from hijacking the boot process by replacing the intended software with malicious software.

Stealthier, more powerful, and hard to disinfect

So-called bootkits are among the most serious types of infections because they run at the lowest level of the software stack. That allows the malware to be stealthier than most malware, survive operating system reinstallations, and circumvent security protections built into the OS.

Read 18 remaining paragraphs | Comments

index?i=9JpHJekJfQg:q19fNpV_We8:V_sGLiPB index?i=9JpHJekJfQg:q19fNpV_We8:F7zBnMyn index?d=qj6IDK7rITs index?d=yIl2AUoC8zA
External Content
Source RSS or Atom Feed
Feed Location http://feeds.arstechnica.com/arstechnica/index
Feed Title Ars Technica - All content
Feed Link https://arstechnica.com/
Reply 0 comments