Security

Research

Phoenix UEFI flaw puts long list of Intel chips in hot seat

Researchers discuss it in same breath as BlackLotus and MosaicRegressor


A new vulnerability in UEFI firmware is threatening the security of a wide range of Intel chip families in a similar fashion to BlackLotus and others like it.

Security shop Eclypsium just published its account of CVE-2024-0762 (CVSSv3: 7.5) after disclosing it to Phoenix Technologies, whose UEFI firmware is affected. Phoenix Technologies provides UEFI/BIOS device firmware for Windows laptops, tablets, desktops and servers.

The researchers originally found the buffer overflow bug in Lenovo's ThinkPad X1 Carbon 7th Gen and X1 Yoga 4th Gen devices and soon discovered the same flaw affected multiple Intel chip families going back to Kaby Lake in 2017.

Select chips in the following lines are potentially affected:

"Given that these Intel Core processors are used by a wide range of OEMs and ODMs, the same vulnerability could potentially affect a wide range of vendors and potentially hundreds of PC products that also use the Phoenix SecureCore UEFI firmware," Eclypsium says in its post.

The vulnerability is located in the Trusted Platform Module (TPM) configuration and centers around an unsafe variable (TCG2_CONFIGURATION), the abuse of which could lead to a buffer overflow, privilege escalation, and code execution.

The variable is configured differently on every platform. That configuration and the permissions assigned to it dictate the possibility and degree to which the vulnerability can be exploited.

Given that CVE-2024-0762 is located in the code that handles the configuration of the TPM, simply having a TPM in a device, which is designed to increase its security and prevent untrustworthy boot processes from executing, won't be enough to prevent successful exploits.

Lenovo has already issued patches for the vulnerability and a glance at its advisory shows a wide range of notebooks and ThinkPads were affected. Lenovo owners, take a look and patch up if needed.

Disclosing the vulnerability last month, Phoenix Technologies said mitigations were made available as early as April.

"Phoenix Technologies strongly recommends customers to update their firmware to the latest version and contact their hardware vendor as soon as possible to prevent any potential exploitation of this flaw," it said.

The Reg asked Intel for a statement but it didn't immediately respond.

Akin to big threats of the past

UEFI exploits always tend to raise the industry's eyebrows as they often allow silent backdoors into the lowest, most privileged levels of a system and exploits are notoriously difficult to detect.

Backdoors of yesteryear such as BlackLotus, CosmicStrand, and MosaicRegressor are previous examples of UEFI flaws that made security pros sweat. This flaw, which Eclypsium dubbed "UEFICanHazBufferOverflow" (awful and won't be repeated by us again), is being hyped as a finding of similar significance.

Eclypsium made the wise decision to not release proof of concept code, but explained that budding black hats might be able to achieve a successful exploit if they fudged the calls to the GetVariable UEFI service in the right way.

It said: "There are two calls to GetVariable with the 'TCG2_CONFIGURATION' argument and the same DataSize, without adequate checks in between.

"If an attacker can modify the value of the 'TCG2_CONFIGURATION' UEFI variable at system run time, they can set it to a value long enough so that the first call to GetVariable returns EFI_BUFFER_TOO_SMALL, and the data_size is set to the length of the UEFI variable. The second call would succeed and overflow the buffer, leading to a stack buffer overflow." ®

Send us news
21 Comments

Tired of airport security queues? SQL inject yourself into the cockpit, claim researchers

Infosec hounds say they spotted vulnerability during routine travel in the US

Intel Arrow Lake to be made elsewhere as 20A process node canned

Meanwhile, Broadcom reportedly displeased with 18A wafers

Intel's 120 TOPS Lunar Lake AI PC chips have landed

And all it took was some good old fashioned outsourcing to TSMC

Dow-ward spiral: Intel share price drop could see it delisted from blue-chip index

50% dive in market cap during 2024 forcing CEO Pat Gelsinger to revisit strategy

Gelsinger opens up about Intel troubles amid talk of possible split

From spinoffs to layoffs and a boardroom revolt, 2024 isn't going great for Chipzilla

Intel enlists Morgan Stanley to defend against activist investors

Multiple lawsuits doesn't mean investors are coming for the board yet, but better safe than sorry, right?

Intel's Software Guard Extensions broken? Don't panic

More of a storm in a teacup

Check your IP cameras: There's a new Mirai botnet on the rise

Also, US offering $2.5M for Belarusian hacker, Backpage kingpins jailed, additional MOVEit victims, and more

Qualcomm guns for Intel, AMD with cheaper 8-core X chips

It’s set to slice up the AI PC competition at $700-$900

Multiple flaws in Microsoft macOS apps unpatched despite potential risks

Windows giant tells Cisco Talos it isn't fixing them

US sues Georgia Tech over alleged cybersecurity failings as a Pentagon contractor

Rap sheet spells out major no-nos after disgruntled staff blow whistle

Brain Cipher claims attack on Olympic venue, promises 300 GB data leak

French police reckon financial system targeted during Summer Games