> Due to its complexity and closed source approach, many different UEFI
implementations have
> suffered many different vulnerabilities. Many (all?) include a full
network stack.

I have closed UEFI shell UEFI. As you all, probably, if you use UEFI as
BSP. You could NOT enter UEFI shell, since
every vendor disables this. I can break into the UEFI shell in no time. Then,
you can imagine what I can do? As
example, write .efi rootkit file, to exploit UEFI. Etc...

NOT to mention that UEFI on my notebook is protected with the admin
password, but this does NOT prevent me to
break into the UEFI shell (I do NOT care about password protection, as it
does NOT exist at all).

Zoran

On Fri, Dec 8, 2017 at 4:26 PM, awokd <aw...@elude.in> wrote:

> On Fri, December 8, 2017 4:44 am, Zoran Stojsavljevic wrote:
> > Let me try again to state what I stated before, with some new insides,
> > because Tim brought the new equation: HAP into
> > this discussion.
>
> In addition to all the issues with ME listed so far, systems from Dell
> etc. ship with UEFI BIOS. Due to its complexity and closed source
> approach, many different UEFI implementations have suffered many different
> vulnerabilities. Many (all?) include a full network stack. Coreboot is
> open source and simply a bootstrap, closing out large swaths of attack
> surfaces.
>
>
>
-- 
coreboot mailing list: coreboot@coreboot.org
https://mail.coreboot.org/mailman/listinfo/coreboot

Reply via email to