Firmware flaw affects numerous generations of Intel CPUs — UEFI code execution vulnerability found for Intel CPUs from 14th Gen Raptor Lake to 6th Gen Skylake CPUs, and TPM will not save you
Eclypsium Automata uncovers Phoenix as the latest to fall to a significant Arbitrary Code Execution exploit impacting Lenovo, AMI, Insyde, and Intel motherboard firmware.
Using its automated binary analysis system Eclypsium Automata, Eclypsium has uncovered the existence of high-impact security vulnerabilities in Phoenix SecureCore UEFI firmware used by a wide variety of motherboard providers and Intel CPUs spanning from 14th Gen to 6th Gen—all the "Lakes" in other words. This vulnerability also extends to several other UEFI BIOS vendors, including Lenovo, Intel, Insyde, and AMI. Phoenix is the latest to join the list.
The specific Phoenix SecureCore UEFI firmware vulnerability that prompted this posting is referred to as "UEFIcanhazbufferoverflow" by Eclypsium, which is just a funny way of pointing out that this is a buffer overflow exploit. The specific method in which the "UEFIcanhazbufferoverflow" exploit works is by using an unsafe call to the "GetVariable" UEFI service.
By making unsafe calls, a stack buffer overflow can be created, allowing for arbitrary code to be executed. In the BIOS or its modern counterpart, the UEFI, even a buffer overflow allows for full-system access and control to be gained very quickly, and the consequences of that happening can be challenging to remove from a PC permanently. Sometimes, it may even be impossible without replacing the machine entirely— and that's not counting passwords and such that may become compromised and still need changing between machines.
Any potentially impacted Intel user should update their BIOS to protect from this issue as soon as possible, though not before creating backups of important files and the original BIOS just in case something goes wrong. Since exploits impacting UEFI are as close to Layer 0 as they get with PC hardware, it's essential for all parties involved to act as quickly and safely as possible.
As noted by Eclypsium, this Phoenix vulnerability was discovered in a hands-off manner by its Automata security system, which is an automated binary analysis system using the research data of Eclypsium's own researchers. While there are certainly issues with things like AI-written code and AI "generated" art, it's always nice to see cutting-edge AI and machine learning tech put toward something useful for humanity.
Stay On the Cutting Edge: Get the Tom's Hardware Newsletter
Get Tom's Hardware's best news and in-depth reviews, straight to your inbox.
Christopher Harper has been a successful freelance tech writer specializing in PC hardware and gaming since 2015, and ghostwrote for various B2B clients in High School before that. Outside of work, Christopher is best known to friends and rivals as an active competitive player in various eSports (particularly fighting games and arena shooters) and a purveyor of music ranging from Jimi Hendrix to Killer Mike to the Sonic Adventure 2 soundtrack.
-
Pierce2623 So is this any different from all these other modern “vulnerabilities” that require physical access to the PC to make it vulnerable?Reply -
-Fran-
While I get why you may be dismissive, you have to consider most big Corpos are now fully using notebooks and people carry them everywhere, so chances of stealing one and tampering with it are just growing year over year.Pierce2623 said:So is this any different from all these other modern “vulnerabilities” that require physical access to the PC to make it vulnerable?
Server and, to a degree, desktop PC is low-ish risk. Laptop, this (like any other with physical access) matters quite a bit.
Regards. -
rluker5
But if you have your drive bitlocked with an fTPM, isn't that secure to UEFI tampering with the worst possible outcome of the drive becoming unreadable, which is a moot point if someone already stole your work laptop and has it in pieces in a lab somewhere? I don't think companies care that much about the laptop hardware if it is stolen, just the information on it.-Fran- said:While I get why you may be dismissive, you have to consider most big Corpos are now fully using notebooks and people carry them everywhere, so chances of stealing one and tampering with it are just growing year over year.
Server and, to a degree, desktop PC is low-ish risk. Laptop, this (like any other with physical access) matters quite a bit.
Regards. -
-Fran-
You're not necessarily wrong, but the mere fact you can't physically destroy it is still a risk in and off itself. Remember it's not about it being impossible to decrypt, but a matter of time.rluker5 said:But if you have your drive bitlocked with an fTPM, isn't that secure to UEFI tampering with the worst possible outcome of the drive becoming unreadable, which is a moot point if someone already stole your work laptop and has it in pieces in a lab somewhere? I don't think companies care that much about the laptop hardware if it is stolen, just the information on it.
Depending on the Industry you are, it may be more or less important and, on average, I do believe you're correct. Still, there's plenty Industries nowadays where they're implementing remote-destruction for such cases.
Regards. -
mac_angel
these are very rare cases when compared to the masses; and I'd hazard a guess that it's probably less than 0.001% of all the computers out there. And they should all have a lot of various security options on these laptops.-Fran- said:You're not necessarily wrong, but the mere fact you can't physically destroy it is still a risk in and off itself. Remember it's not about it being impossible to decrypt, but a matter of time.
Depending on the Industry you are, it may be more or less important and, on average, I do believe you're correct. Still, there's plenty Industries nowadays where they're implementing remote-destruction for such cases.
Regards.
So, how does this affect everyone else? Is this another "exploit" that needs physical access to the hardware to do anything? If so, then pretty much every single home PC is not at risk. Every kid in high school, and probably college would be at very low risk, too. -
bit_user
Not sure about that. Whenever I upgrade the BIOS of my Alder Lake corporate Dell PCs, it disables bitlocker and reboots, to do the install, then re-enables bitlocker. Seems like an exploit could take advantage of that.rluker5 said:But if you have your drive bitlocked with an fTPM, isn't that secure to UEFI tampering with the worst possible outcome of the drive becoming unreadable,
Also, does any part of UEFI firmware stay resident, while the OS is running? Or is UEFI exclusively just a pre-boot environment? -
bit_user
I approve of this reference.The article said:The specific Phoenix SecureCore UEFI firmware vulnerability that prompted this posting is referred to as "UEFIcanhazbufferoverflow" by Eclypsium, which is just a funny way of pointing out that this is a buffer overflow exploit.
-
But cannot be exploited.Reply
Exploitation is less likely because this is something an attacker would use after gaining access to the system to maintain persistence. That's why Eclypsium is not releasing a proof-of-concept exploit.
This one also seems less ‘developed’ vulnerability than LogoFail. Because it does not have stages of payload deployment after being executed, and is specific to the Phoenix BIOS. -
-Fran-
What are you refering to with "these very rare cases"?mac_angel said:these are very rare cases when compared to the masses; and I'd hazard a guess that it's probably less than 0.001% of all the computers out there. And they should all have a lot of various security options on these laptops.
So, how does this affect everyone else? Is this another "exploit" that needs physical access to the hardware to do anything? If so, then pretty much every single home PC is not at risk. Every kid in high school, and probably college would be at very low risk, too.
And as I said, the number is growing anyway. Why would a business, any business, would risk losing information if they could easily avoid it?
I don't diagree with the rest of what you said, as I said so myself in the original reply. If this would be important, it would be for corporate users with confidential/restricted/critical information in their laptops.
As for the likelihood of exploitation... I'm not clear TBH, so I can't comment in that particular, but very relevant, tidbit.
Regards. -
Alvar "Miles" Udell While there are certainly issues with things like AI-written code and AI "generated" art, it's always nice to see cutting-edge AI and machine learning tech put toward something useful for humanity.
Just wait until the bug bounty hunters complain about losing tens of thousands of dollars per year because AI took their jobs...