Open Menu
AllLocalCommunitiesAbout
lotide
AllLocalCommunitiesAbout
Login

Critical 'LogoFAIL' Bugs Offer Secure Boot Bypass for Millions of PCs

⁨9⁩ ⁨likes⁩

Submitted ⁨⁨1⁩ ⁨year⁩ ago⁩ by ⁨IllNess@infosec.pub⁩ to ⁨cybersecurity@infosec.pub⁩

https://www.darkreading.com/endpoint-security/critical-logofail-bugs-secure-boot-bypass-millions-pcs

source

Comments

Sort:hotnewtop
  • conorab@lemmy.conorab.com ⁨1⁩ ⁨year⁩ ago

    So this nullifies Bitlocker when the key is stored jn the TPM right? The whole reason that works is the TPM verifies that the OS is secure before boot and so the OS can then be trusted with the Bitlocker encryption key. But if the TPM believes the OS is secure when it isn’t, you can modify the OS to just dump the encryption key on boot. Am I missing something here?

    source
  • IllNess@infosec.pub ⁨1⁩ ⁨year⁩ ago

    To minimize firmware risk in general, users should stay updated with manufacturer advisories and promptly apply firmware updates, as they often address critical security flaws.

    source