Jump to content

[UPDATED] Dell, Fujitsu, HP, Lenovo, Gigabyte, possibly other Intel/UEFI motherboards vulnerable to malicious BIOS exploits

PCgamer324

Source 1: http://www.theregister.co.uk/2016/07/06/nasty_bios_bug_slugs_gigabyte_hackers_say/

Source 2: http://www.theregister.co.uk/2016/07/04/lenovo_scrambling_to_get_a_fix_for_bios_vuln/

 

Inherent vulnerabilities in UEFI are finally catching up with consumer motherboard manufactures; notably Lenovo, HP and even Gigabyte...

Quote

Gigabyte has been swept into turmoil surrounding low-level security vulnerabilities that allows attackers to kill flash protection, secure boot, and tamper with firmware on PCs by Lenovo and other vendors.

Affected units have expanded to "enthusiast-grade" motherboards such as members of the "Ultra Durable" series 

Quote

Unconfirmed reports suggest the hardware vendor has used the "ThinkPwn" vulnerable code, thought to be born of Intel reference code, on four of its motherboards: Z68-UD3H, Z77X-UD5H, Z87MX-D3H, and Z97-D3H. (SEE BELOW FOR UPDATES)

It is suggested that if you use a Lenovo or HP system or one of the affected Gigabyte motherboards that you follow this story closely and patch as soon as a fix is made available.  Such low-level level exploits could damage components, create hardware-level backdoors and even spread to USB and PCIe devices. given ties to Intel Reference Code, I wouldn't say anyone using UEFI or particularly Gigabyte/Intel is out of the woods yet.  It's relatively impossible for a security research to test all of a companies product line alone.

 

 

We'll have to wait for this to pan out...

 

[UPDATE]

 

Further tweets from the researchers behind this exploit suggest all SandyBridge - Broadwell systems are affected:

Dell and Fujitsu also effected:

 

 

 

Ultimate XP gaming system build log coming soon!  Q8200 // 8GB DDR2 // Asus P5E Deluxe X48 // Asus 4870 DARK KNIGHT X-Fire // Supreme FX sound // BFG Ageia PhysX PCI Co-Processor // AX 860x with Silverstone extensions 

Link to comment
Share on other sites

Link to post
Share on other sites

5 minutes ago, Dan Castellaneta said:

Oh boy.

Good thing I have a shit AM3+ Gigabyte motherboard.

I edited the post, but from what I'm seeing the exploit seems to be a derivative of Intel Reference Code.  This could insinuate that AMD is not affected, but we do not know at this time

Ultimate XP gaming system build log coming soon!  Q8200 // 8GB DDR2 // Asus P5E Deluxe X48 // Asus 4870 DARK KNIGHT X-Fire // Supreme FX sound // BFG Ageia PhysX PCI Co-Processor // AX 860x with Silverstone extensions 

Link to comment
Share on other sites

Link to post
Share on other sites

1 minute ago, PCgamer324 said:

I edited the post, but from what I'm seeing the exploit seems to be a derivative of Intel Reference Code.  This could insinuate that AMD is not affected, but we do not know at this time

From the way I read it, it sounded like something along the lines of Intel only.

We'll see how this pans out.

Check out my guide on how to scan cover art here!

Local asshole and 6th generation console enthusiast.

Link to comment
Share on other sites

Link to post
Share on other sites

This just in: AMD is so much better than Intel. Time to go buy FX processors y'all!

 

In all seriousness: I know it says Intel reference code but doesn't Intel contribute to the UEFI standard (it could be something Intel submitted to the UEFI standard and then used by AMD)? Are we sure that AMD couldn't be affected? Is it proprietary code/Intel board only code?

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

1 minute ago, Trixanity said:

This just in: AMD is so much better than Intel. Time to go buy FX processors y'all!

 

In all seriousness: I know it says Intel reference code but doesn't Intel contribute to the UEFI standard? Are we sure that AMD couldn't be affected? Is it proprietary code/Intel board only code?

 

 

it's unclear at this time

Ultimate XP gaming system build log coming soon!  Q8200 // 8GB DDR2 // Asus P5E Deluxe X48 // Asus 4870 DARK KNIGHT X-Fire // Supreme FX sound // BFG Ageia PhysX PCI Co-Processor // AX 860x with Silverstone extensions 

Link to comment
Share on other sites

Link to post
Share on other sites

3 minutes ago, Bouzoo said:

Looks at his MB, Gigabyte H97. Dodged it. 

given ties to Intel Reference Code, I wouldn't say anyone using UEFI or particularly Gigabyte/Intel is out of the woods yet.  It's relatively impossible for a security research to test all of a companies product line alone.

 

Ultimate XP gaming system build log coming soon!  Q8200 // 8GB DDR2 // Asus P5E Deluxe X48 // Asus 4870 DARK KNIGHT X-Fire // Supreme FX sound // BFG Ageia PhysX PCI Co-Processor // AX 860x with Silverstone extensions 

Link to comment
Share on other sites

Link to post
Share on other sites

2 minutes ago, PCgamer324 said:

given ties to Intel Reference Code, I wouldn't say anyone using UEFI or particularly Gigabyte/Intel is out of the woods yet.  It's relatively impossible for a security research to test all of a companies product line alone.

 

Seeing how all MBs are Z series, it may something to do with Ocing chipset. May.

The ability to google properly is a skill of its own. 

Link to comment
Share on other sites

Link to post
Share on other sites

 

(ignore comment; editor reposted the topic here when saving for some reason)

Ultimate XP gaming system build log coming soon!  Q8200 // 8GB DDR2 // Asus P5E Deluxe X48 // Asus 4870 DARK KNIGHT X-Fire // Supreme FX sound // BFG Ageia PhysX PCI Co-Processor // AX 860x with Silverstone extensions 

Link to comment
Share on other sites

Link to post
Share on other sites

 

5 minutes ago, Bouzoo said:

Seeing how all MBs are Z series, it may something to do with Ocing chipset. May.

 

Given that this affects Lenovo and HP units that use consumer-oriented chipsets, I don't think that non-Z boards are any different in that regard

Ultimate XP gaming system build log coming soon!  Q8200 // 8GB DDR2 // Asus P5E Deluxe X48 // Asus 4870 DARK KNIGHT X-Fire // Supreme FX sound // BFG Ageia PhysX PCI Co-Processor // AX 860x with Silverstone extensions 

Link to comment
Share on other sites

Link to post
Share on other sites

2 minutes ago, PCgamer324 said:

 

 

Given that this affects Lenovo and HP units that use consumer-oriented chipsets, I don't think that non-Z boards are any different in that regard

That is a rather good point.

The ability to google properly is a skill of its own. 

Link to comment
Share on other sites

Link to post
Share on other sites

You do realize you have to have a virus in the first place that can mess around at the BIOS level for this to ever affect you, right?

 

It's a basic part of any OS course to learn how bios works in bootloading, normal runtime, and shutdown sequence. If you try to access UEFI code while in normal runtime, you'll instantly generate kernel panic. You have to have a very serious virus in your system before this will ever affect you, or direct hardware access with someone replacing your BIOS chips.

Software Engineer for Suncorp (Australia), Computer Tech Enthusiast, Miami University Graduate, Nerd

Link to comment
Share on other sites

Link to post
Share on other sites

7 minutes ago, patrickjp93 said:

You do realize you have to have a virus in the first place that can mess around at the BIOS level for this to ever affect you, right?

 

It's a basic part of any OS course to learn how bios works in bootloading, normal runtime, and shutdown sequences work. If you try to access UEFI code while in normal runtime, you'll instantly generate kernel panic. You have to have a very serious virus in your system before this will ever affect you, or direct hardware access with someone replacing your BIOS chips.

Given the damage possible with a bios vulnerability, it's not that far fetched to be concern.

When you look at some ms did viruses that affected bios, some of them basically rendered the computer to be unusable if you didn't flashed a new bios, which isn't that fun to have to do

Link to comment
Share on other sites

Link to post
Share on other sites

4 minutes ago, patrickjp93 said:

You do realize you have to have a virus in the first place that can mess around at the BIOS level for this to ever affect you, right?

 

It's a basic part of any OS course to learn how bios works in bootloading, normal runtime, and shutdown sequences work. If you try to access UEFI code while in normal runtime, you'll instantly generate kernel panic. You have to have a very serious virus in your system before this will ever affect you, or direct hardware access with someone replacing your BIOS chips.

true, but if my sources are correct we could see a physical attack vector as well, such as a malicious USB drive gaining access to the UEFI RX bus.  I am not particularly familiar with the intricacies of BIOS connectivity and operation; any further details you could share on the subject would certainly contribute to the topic at hand, particularly on how and when devices can write to such chips

Ultimate XP gaming system build log coming soon!  Q8200 // 8GB DDR2 // Asus P5E Deluxe X48 // Asus 4870 DARK KNIGHT X-Fire // Supreme FX sound // BFG Ageia PhysX PCI Co-Processor // AX 860x with Silverstone extensions 

Link to comment
Share on other sites

Link to post
Share on other sites

Are ASUS boards affected?

If so, PARANOIA ENGAGE!

Project White Lightning (My ITX Gaming PC): Core i5-4690K | CRYORIG H5 Ultimate | ASUS Maximus VII Impact | HyperX Savage 2x8GB DDR3 | Samsung 850 EVO 250GB | WD Black 1TB | Sapphire RX 480 8GB NITRO+ OC | Phanteks Enthoo EVOLV ITX | Corsair AX760 | LG 29UM67 | CM Storm Quickfire Ultimate | Logitech G502 Proteus Spectrum | HyperX Cloud II | Logitech Z333

Benchmark Results: 3DMark Firestrike: 10,528 | SteamVR VR Ready (avg. quality 7.1) | VRMark 7,004 (VR Ready)

 

Other systems I've built:

Core i3-6100 | CM Hyper 212 EVO | MSI H110M ECO | Corsair Vengeance LPX 1x8GB DDR4  | ADATA SP550 120GB | Seagate 500GB | EVGA ACX 2.0 GTX 1050 Ti | Fractal Design Core 1500 | Corsair CX450M

Core i5-4590 | Intel Stock Cooler | Gigabyte GA-H97N-WIFI | HyperX Savage 2x4GB DDR3 | Seagate 500GB | Intel Integrated HD Graphics | Fractal Design Arc Mini R2 | be quiet! Pure Power L8 350W

 

I am not a professional. I am not an expert. I am just a smartass. Don't try and blame me if you break something when acting upon my advice.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

...why are you still reading this?

Link to comment
Share on other sites

Link to post
Share on other sites

7 minutes ago, laminutederire said:

Given the damage possible with a bios vulnerability, it's not that far fetched to be concern.

When you look at some ms did viruses that affected bios, some of them basically rendered the computer to be unusable if you didn't flashed a new bios, which isn't that fun to have to do

Yes, but that was because XP was a security nightmare and elevating privilege in Windows 7 was easy. You still have to get the OS into shutdown mode to execute code that can affect the BIOS, or you have to inject code into the boot loader section of the OS. In Windows 8 and 10 that is no simple task.

Software Engineer for Suncorp (Australia), Computer Tech Enthusiast, Miami University Graduate, Nerd

Link to comment
Share on other sites

Link to post
Share on other sites

Quote

Unconfirmed reports suggest the hardware vendor has used the "ThinkPwn"

You know what cracks me up? The thought of a contingency Company meeting where a bunch of middle age executives are talking about it and have to struggle with calling their issue ThinkPwn

-------

Current Rig

-------

Link to comment
Share on other sites

Link to post
Share on other sites

9 minutes ago, PCgamer324 said:

true, but if my sources are correct we could see a physical attack vector as well, such as a malicious USB drive gaining access to the UEFI RX bus.  I am not particularly familiar with the intricacies of BIOS connectivity and operation; any further details you could share on the subject would certainly contribute to the topic at hand, particularly on how and when devices can write to such chips

If you touch the UEFI while the OS is running normally, you generate a CPU interrupt which causes kernel panic in that mode which freezes EVERYTHING in the system. Worst case scenario is an unworkable BIOS, but there's not enough time to write a full malicious code stream.

Software Engineer for Suncorp (Australia), Computer Tech Enthusiast, Miami University Graduate, Nerd

Link to comment
Share on other sites

Link to post
Share on other sites

24 minutes ago, patrickjp93 said:

If you touch the UEFI while the OS is running normally, you generate a CPU interrupt which causes kernel panic in that mode which freezes EVERYTHING in the system. Worst case scenario is an unworkable BIOS, but there's not enough time to write a full malicious code stream.

Thanks for the info. What about those "tools" vendors give to change UEFI splashscreen or even update BIOS inside the OS. I used the splashcreen one to tinker around. But AFAIK that basically modifies the BIOS while you're running an OS. Isn't that a point of risk?

Link to comment
Share on other sites

Link to post
Share on other sites

30 minutes ago, Doughnutnator said:

Thanks for the info. What about those "tools" vendors give to change UEFI splashscreen or even update BIOS inside the OS. I used the splashcreen one to tinker around. But AFAIK that basically modifies the BIOS while you're running an OS. Isn't that a point of risk?

They are specifically signed app's Microsoft allows to modify the shutdown sequence to modify the skin before completely shutting down.

Software Engineer for Suncorp (Australia), Computer Tech Enthusiast, Miami University Graduate, Nerd

Link to comment
Share on other sites

Link to post
Share on other sites

25 minutes ago, patrickjp93 said:

They are specifically signed app's Microsoft allows to modify the shutdown sequence to modify the skin before completely shutting down.

Not sure you can even change full screen boot logo on uefi at all? I've personally owned a Gigabyte Z97X, an Asus Z170 and an MSI Z170 and none of them have had that option. 

Main Rig:-

Ryzen 7 3800X | Asus ROG Strix X570-F Gaming | 16GB Team Group Dark Pro 3600Mhz | Corsair MP600 1TB PCIe Gen 4 | Sapphire 5700 XT Pulse | Corsair H115i Platinum | WD Black 1TB | WD Green 4TB | EVGA SuperNOVA G3 650W | Asus TUF GT501 | Samsung C27HG70 1440p 144hz HDR FreeSync 2 | Ubuntu 20.04.2 LTS |

 

Server:-

Intel NUC running Server 2019 + Synology DSM218+ with 2 x 4TB Toshiba NAS Ready HDDs (RAID0)

Link to comment
Share on other sites

Link to post
Share on other sites

6 minutes ago, Master Disaster said:

Not sure you can even change full screen boot logo on uefi at all? I've personally owned a Gigabyte Z97X, an Asus Z170 and an MSI Z170 and none of them have had that option. 

There are a couple select apps that can change it, but I'm not into that. Still, the restrictions I mentioned remain. By the time this is an issue, you already have a virus with permissions to modify the OS-reserved memory and drive sectors. It's already over by that point.

Software Engineer for Suncorp (Australia), Computer Tech Enthusiast, Miami University Graduate, Nerd

Link to comment
Share on other sites

Link to post
Share on other sites

1 hour ago, patrickjp93 said:

They are specifically signed app's Microsoft allows to modify the shutdown sequence to modify the skin before completely shutting down.

And what about the ones used to flash the actual BIOS from inside the OS? I dont think those are modifying the shutdown process because that would be quick, but those things are actually "very slow"...

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×