Security updates for operating systems and hardware have become more important than ever, while new vulnerabilities are discovered every day. Recently, a new security vulnerability was discovered in UEFI affecting millions of PCs worldwide.
Called LogoFAIL, this vulnerability was discovered by computer security researchers and presented at “Black Hat Security Conference”, from London. This indicates a problem with the Unified Extensible Firmware Interface (UEFI), the software component responsible for booting most Windows and Linux computers. In short, LogoFAIL is a BIOS vulnerability.
The interesting part is that this security vulnerability in UEFI although very dangerous, it is not known exactly whether until now it has been exploited by hackers to attack the computers of users or companies around the world. The vulnerability has been around for many years (or maybe even decades), but was recently discovered and documented in a security vulnerability research study.
Details LogoFAIL: Security Vulnerability in UEFI
The attack consists of twenty vulnerabilities in image analyzers in UEFI, thus affecting almost all x64 and ARM CPU ecosystems. LogoFAIL targets the logos displayed on the device screen during the boot process, exploiting vulnerabilities in image analyzers to replace legitimate logos with infected files. This manipulation allows the execution of arbitrary code during launch Driver Execution Environment (DXE), compromising the platform's security.
LogoFAIL can be executed remotely and bypass traditional protections such as Secure Boot or Intel’s Secure Boot. Once arbitrary code execution is done in the phase DXE, attackers gain full control over the target device's memory and disk, including the operating system. Imagine if a hacker could take control of your computer right from the start – it could access all your files, monitor what you do, or even install programs malware. That's why LogoFAIL is a major problem.
In the coming period, device manufacturers, processors, and including UEFI vendors, will release updates and security patches to eliminate this security vulnerability in UEFI.
It should be noted that Mac users are not affected by this vulnerability. Intel Macs are not affected, and those with Apple Silicon do not use UEFI at all.