Just about every Windows and Linux device vulnerable to new LogoFAIL firmware attack(ars technica)
Just about every Windows and Linux device vulnerable to new LogoFAIL firmware attack(ars technica)
Posted Dec 7, 2023 18:32 UTC (Thu) by BlueLightning (subscriber, #38978)Parent article: Just about every Windows and Linux device vulnerable to new LogoFAIL firmware attack (Ars Technica)
Posted Dec 7, 2023 18:47 UTC (Thu)
by ballombe (subscriber, #9523)
[Link] (2 responses)
Posted Dec 7, 2023 21:04 UTC (Thu)
by NYKevin (subscriber, #129325)
[Link] (1 responses)
Posted Dec 8, 2023 3:28 UTC (Fri)
by raven667 (subscriber, #5198)
[Link]
There are probably a bunch of ways to detect modified boot logo files, by changing the logo to something custom, if it gets reverted to a stock looking one, maybe something is up, or just put additional audit and AV scanning around modifying this image, AV vendors could probably get the SHA512 hash of all the extant custom images from their installed base and check for shenanigans, flagging any new hashes for further scrutiny, or blocking modification.
Im sure there is going to be a long tail of exploitable systems but it is possible to get a handle on this for new systems and maintained systems I think.
Just about every Windows and Linux device vulnerable to new LogoFAIL firmware attack(ars technica)
Just about every Windows and Linux device vulnerable to new LogoFAIL firmware attack(ars technica)
Just about every Windows and Linux device vulnerable to new LogoFAIL firmware attack(ars technica)