Firmware security firm Eclypsium discovered a vulnerability, tracked as CVE-2024-0762 (CVSS of 7.5), in the Phoenix SecureCore UEFI firmware.<\/p>\n\n\n\n
The issue, called UEFIcanhazbufferoverflow<\/a>, potentially impacts hundreds of PC and server models that use Intel Core desktop and mobile processors.<\/p>\n\n\n\n
“These are Intel codenames for multiple generations of Intel Core mobile and desktop processors. Given that these Intel Core processors are used by a wide range of OEMs and ODMs, the same vulnerability could potentially affect a wide range of vendors and potentially hundreds of PC products that also use the Phoenix SecureCore UEFI firmware.” reads the analysis<\/strong><\/a> published by hardware security firm Eclypsium.\u00a0“The possibility of exploitation depends on the configuration and permission assigned to the TCG2_CONFIGURATION variable, which could be different for every platform.”<\/em><\/p>\n\n\n\n
This type of flaw can be exploited to establish a firmware backdoor such as\u00a0BlackLotus<\/a>. The experts warn of an increasing number of implants exploiting flaws like this to maintain persistence evading higher-level security measures. The security firm added that the the manipulation of runtime code can make attacks harder to detect via various firmware measurements.<\/p>\n\n\n\n
Eclypsium disclosed the issue in coordination with Phoenix Technologies and Lenovo PSIRT. Lenovo released relevant BIOS updates at\u00a0Multi-vendor BIOS Security Vulnerabilities (May, 2024) \u2013 Lenovo Support US<\/a>.
Follow me on Twitter: @securityaffairs<\/strong><\/a> and Facebook<\/strong><\/a> and Mastodon<\/strong><\/a><\/p>\n\n\n\n
Pierluigi Paganini<\/strong><\/a><\/p>\n\n\n\n
(<\/strong>SecurityAffairs<\/strong><\/a>\u00a0\u2013<\/strong>\u00a0hacking, Phoenix SecureCore UEFI firmware)<\/strong>