Hundreds of UEFI products from 10 vendors are vulnerable to compromise due to a critical firmware supplychain issue known as PKfail. This flaw allows attackers to bypass Secure Boot and install malware. The Binarly Research Team discovered that affected devices use a test Secure Boot "master key"and the Platform Key (PK) generated by American Megatrends International (AMI), tagged as "DO NOT TRUST." Upstream vendors should have replaced this key with their securely generated ones, but many OEMs or device vendors failed to do so, resulting in devices shipping with untrusted keys. The affected vendors include Acer, Aopen, Dell, Formelife, Fujitsu, Gigabyte, HP, Intel, Lenovo, and Supermicro. The UEFI device makers impacted by this issue include major brands such as Acer, Aopen, Dell, Formelife, Fujitsu, Gigabyte, HP, Intel, Lenovo, and Supermicro, spanning across 813 products. In May 2023, Binarly identified a supply chain security incident involving leaked private keys from Intel Boot Guard, affecting multiple vendors. This was initially reported by BleepingComputer when the Money Message extortion gang leaked MSI source code for firmware, which included private keys for 57 MSI products and Intel Boot Guard private keys for another 116 MSI products. Additionally, earlier this year, a private key from AMI related to the Secure Boot "master key" was leaked, affecting numerous enterprise devices still in use today. The first firmware vulnerable to PKfail was released in May 2012, and the latest in June 2024, making this one of the longest-lasting supply-chain issues. To mitigate PKfail, vendors are advised to follow cryptographic key management best practices and replace any test keys from independent BIOS vendors like AMI with securely generated keys. Users should also monitor and apply firmware updates and security patches promptly. Binarly has launched the pk.fail website to help users scan firmware binaries for PKfail vulnerabilities and malicious payloads.
Cybersecurity researchers have uncovered four critical vulnerabilities in OpenClaw that can be chained together to enable data theft, privilege escalation, and long-term persistenc...
OpenAI confirmed that two employee devices were compromised as part of a broader supply chain attack involving malicious packages distributed through the TanStack JavaScript ecosys...
Gunra Ransomware has emerged as a significant cyber threat targeting Windows-based enterprise environments across multiple industries, including manufacturing, pharmaceuticals, and...