• Hello and welcome! Register to enjoy full access and benefits:

    • Advertise in the Marketplace section for free.
    • Get more visibility with a signature link.
    • Company/website listings.
    • Ask & answer queries.
    • Much more...

    Register here or log in if you're already a member.

  • 🎉 WHV has crossed 72000 (72k) monthly views (unique) and 272000 clicks per month, as per Google Analytics! Thank you for your support! 🎉

New UEFI Flaw Allows Pre-Boot Attacks on PCs Before Windows Starts

johny899

Member
Content Writer
Messages
1,069
Reaction score
3
Points
43
Balance
$122.4USD
Your computer usually gets to work and spends time doing this before loading Windows. This phase is called UEFI, and recently a new vulnerability has been found during this stage of the start cycle. It was found that this vulnerability affects Gigabyte, MSI, ASUS, and ASRock brand motherboards, which some of us may be using now as part of our day-to-day lives.

What’s The Issue In Simple Terms?​

Attackers can use this vulnerability, commonly referred to as DMA (Direct Memory Access). This permits an external device to communicate directly with your system’s memory without first contacting the CPU for authorization. This is done to invade the computer’s operating system prior to installing their attack tools and gaining access to the system operating environment.

How Does This Present Danger?​

Under normal operating conditions, a technology called IOMMU provides a level of protection from unsafe devices accessing the system memory. At this point in the start-up cycle, on affected systems, IOMMU does not operate fully until the system has finished its booting sequence, leaving an exposed time for:
  • Memory is unprotected.
  • An external device can intercept sensitive information stored in memory.
  • Malicious software may be installed to the computer prior to the completion of Windows boot-up.
If someone has physical access to your computer, they can exploit this vulnerability.

Who Discovered This Problem?​

While researching the latest protection solutions for data integrity against threat actors, the security experts found this vulnerability. They contacted the motherboard manufacturers and provided them with adequate information about the vulnerability so they could develop a fix.

Many of the games that have advanced anti-cheat capabilities will not allow gameplay on any system susceptible to this vulnerability, until the user performs a firmware update. This is evidence of how critical this issue is.

What Actions Should You Take?​

I would recommend the following:
  • Visit the website of the motherboard manufacturer
  • Look for the latest BIOS/UEFI update on the site
  • Install the BIOS/UEFI update by following the instructions very closely
  • Always back up your files prior to an update
It is unlikely that most of us will be compromised by this method, however, keeping your system up to date increases your level of protection.

Closing Thoughts​

The UEFI flaw highlights that security must be established before the PC even turns on. Not keeping your firmware up to date is not merely stale, but is absolutely necessary.