More than 20 vulnerabilities have been found affecting unified extensible firmware interfaces (UEFI) software, allowing attackers to bypass hardware security mechanisms. Credit: Atakan / Getty Images Security firm Binarly has discovered more than 20 vulnerabilities hiding in BIOS/UEFI software from a wide range of system vendors, including Intel, Microsoft, Lenovo, Dell, Fujitsu, HP, HPE, Siemens, and Bull Atos. Binarly found the issues were associated with the use of InsydeH20, a framework code used to build motherboard unified extensible firmware interfaces (UEFI), the interface between a computer’s operating system and firmware. All of the aforementioned vendors used Insyde’s firmware SDK for motherboard development. It is expected that similar types of vulnerabilities exist in other in-house and third-party BIOS-vendor products as well. These vulnerabilities are particularly dangerous because UEFI/BIOS-based attacks can bypass firmware-based security mechanisms. These vulnerabilities include SMM allout or privilege escalation, SMM memory corruption, and DXE memory corruption. The potential damage done by these vulnerabilities is severe because they can be used by attackers to bypass hardware–based security features such as secure boot, virtualization-based security (VBS), and trusted platform modules (TPM). The vulnerabilities are in the UEFI but allow malware to be installed on the system that can survive a hard-drive wipe and operating-system reinstallation. Initially, Binarly disclosed 23 new vulnerabilities but then found five more specific to HP hardware. The vulnerabilities affect both desktop and server hardware, according to Binarly, which has reported them to enterprise vendors and to Insyde. Fixes are in the works. Binarly said it has worked closely with CERT/CC and Insyde teams over the last few months to confirm the vulnerabilities, provide additional technical details, evaluate the associated risk, and work through the responsible disclosure process. Insyde has patched all of the vulnerabilities, but firmware rollouts tend to be slow because firmware is just not updated as frequently as software. Binarly notes that the VINCE platform developed by the CERT/CC team for vulnerability disclosure has been tested in a real environment to significantly reduce the time from the initial disclosure to the security fix down to five months. The usual single-vendor disclosure process takes more than six months—a long time to leave a serious vulnerability unpatched. Binarly has also partnered with the Linux Vendor Firmware Service (LVFS) to discover other vendors and scale detections further to identify affected hardware models using its firmware vulnerability detection tool, called FwHunt. To check if your computer is infected with these vulnerabilities, download FwHunt from GitHub. Related content news Pure Storage adds AI features for security and performance Updated infrastructure-as-code management capabilities and expanded SLAs are among the new features from Pure Storage. By Andy Patrizio Jun 26, 2024 3 mins Enterprise Storage Data Center news Nvidia teases next-generation Rubin platform, shares physical AI vision ‘I'm not sure yet whether I'm going to regret this or not,' said Nvidia CEO Jensen Huang as he revealed 2026 plans for the company’s Rubin GPU platform. By Andy Patrizio Jun 17, 2024 4 mins CPUs and Processors Data Center news Intel launches sixth-generation Xeon processor line With the new generation chips, Intel is putting an emphasis on energy efficiency. By Andy Patrizio Jun 06, 2024 3 mins CPUs and Processors Data Center news AMD updates Instinct data center GPU line Unveiled at Computex 2024. the new AI processing card from AMD will come with much more high-bandwidth memory than its predecessor. By Andy Patrizio Jun 04, 2024 3 mins CPUs and Processors Data Center PODCASTS VIDEOS RESOURCES EVENTS NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe