HP laptop motherboard drivers
Security researchers discovered a software vulnerability affecting UEFI drivers used by Lenovo and HP laptops, and in firmware that runs on Gigabyte motherboards.
Independent security researcher Dymtro Oleksiuk initially found the vulnerability affecting Lenovo's System Management Mode (SMM).
Exploitation of the flaw, dubbed “ThinkPwn, ” could allow a local attacker with administrative access to bypass or disable firmware, including flash write protection, Virtual Secure Mode and Credential Guard bypass in Windows 10 Enterprise, and the UEFI Secure Boot software that prevents unauthorized software from loading during the startup process.
The exploits demonstrate the reasons that the information security industry has “worked so hard to implement trust and verification in the boot and firmware process, ” wrote Kevin Bocek, Venafi's VP of security strategy and threat intelligence, in an email to SCMagazine.com. A vulnerability that could lead to an ability to disable the cryptographic authentication of the boot process is “distressing, ” he noted. “We need to urgently make sure that cryptographic boot and firmware protection is safe and can't be circumvented. Intel, mobile and IOT systems all rely upon cryptographic signing of firmware to protect against malicious code.”
Fidelis Cybersecurity manager of threat systems John Bambenick said exploitation of the vulnerability would be a lucrative target, though he told SCMagazine.com, “I don't think there will widespread criminal campaigns exploiting this vulnerability. It is not technically simple to implement the exploit.”
Oleksiuk, however, was inclined to disagree. In an email to SCMagazine.com, he noted that it would be “relatively easy” to exploit the vulnerability. It would be less complex to implement the ThinkPwn vulnerability than to implement a local privileges escalation vulnerability in Windows or Linux kernel, he added.