Security

Research

Phoenix UEFI flaw puts long list of Intel chips in hot seat

Researchers discuss it in same breath as BlackLotus and MosaicRegressor


A new vulnerability in UEFI firmware is threatening the security of a wide range of Intel chip families in a similar fashion to BlackLotus and others like it.

Security shop Eclypsium just published its account of CVE-2024-0762 (CVSSv3: 7.5) after disclosing it to Phoenix Technologies, whose UEFI firmware is affected. Phoenix Technologies provides UEFI/BIOS device firmware for Windows laptops, tablets, desktops and servers.

The researchers originally found the buffer overflow bug in Lenovo's ThinkPad X1 Carbon 7th Gen and X1 Yoga 4th Gen devices and soon discovered the same flaw affected multiple Intel chip families going back to Kaby Lake in 2017.

Select chips in the following lines are potentially affected:

"Given that these Intel Core processors are used by a wide range of OEMs and ODMs, the same vulnerability could potentially affect a wide range of vendors and potentially hundreds of PC products that also use the Phoenix SecureCore UEFI firmware," Eclypsium says in its post.

The vulnerability is located in the Trusted Platform Module (TPM) configuration and centers around an unsafe variable (TCG2_CONFIGURATION), the abuse of which could lead to a buffer overflow, privilege escalation, and code execution.

The variable is configured differently on every platform. That configuration and the permissions assigned to it dictate the possibility and degree to which the vulnerability can be exploited.

Given that CVE-2024-0762 is located in the code that handles the configuration of the TPM, simply having a TPM in a device, which is designed to increase its security and prevent untrustworthy boot processes from executing, won't be enough to prevent successful exploits.

Lenovo has already issued patches for the vulnerability and a glance at its advisory shows a wide range of notebooks and ThinkPads were affected. Lenovo owners, take a look and patch up if needed.

Disclosing the vulnerability last month, Phoenix Technologies said mitigations were made available as early as April.

"Phoenix Technologies strongly recommends customers to update their firmware to the latest version and contact their hardware vendor as soon as possible to prevent any potential exploitation of this flaw," it said.

The Reg asked Intel for a statement but it didn't immediately respond.

Akin to big threats of the past

UEFI exploits always tend to raise the industry's eyebrows as they often allow silent backdoors into the lowest, most privileged levels of a system and exploits are notoriously difficult to detect.

Backdoors of yesteryear such as BlackLotus, CosmicStrand, and MosaicRegressor are previous examples of UEFI flaws that made security pros sweat. This flaw, which Eclypsium dubbed "UEFICanHazBufferOverflow" (awful and won't be repeated by us again), is being hyped as a finding of similar significance.

Eclypsium made the wise decision to not release proof of concept code, but explained that budding black hats might be able to achieve a successful exploit if they fudged the calls to the GetVariable UEFI service in the right way.

It said: "There are two calls to GetVariable with the 'TCG2_CONFIGURATION' argument and the same DataSize, without adequate checks in between.

"If an attacker can modify the value of the 'TCG2_CONFIGURATION' UEFI variable at system run time, they can set it to a value long enough so that the first call to GetVariable returns EFI_BUFFER_TOO_SMALL, and the data_size is set to the length of the UEFI variable. The second call would succeed and overflow the buffer, leading to a stack buffer overflow." ®

Send us news
21 Comments

Admins better Spring into action over latest critical open source vuln

Patch up: The Spring framework dominates the Java ecosystem

A closer look at Intel and AMD's different approaches to gluing together CPUs

Epycs or Xeons, more cores = more silicon, and it only gets more complex from here

Ex-Intel board members make an ill-conceived case for spinning off Foundry

Save America’s most important manufacturer? More like save our portfolio and let Uncle Sam pick up the pieces

Spectre flaws continue to haunt Intel and AMD as researchers find fresh attack method

The indirect branch predictor barrier is less of a barrier than hoped

macOS HM Surf vuln might already be under exploit by major malware family

Like keeping your camera and microphone private? Patch up

Intel losses hit $16.6B in Q3 and Wall Street is … loving it?

Improving revenue outlook has Chipzilla's shares back on a positive trajectory – for the moment anyway.

Intel to expand Chengdu facility, despite US China tension

Chipzilla unlikely to give in when it comes to its biggest sales market

Top EU court overturns Intel's billion-dollar antitrust fine

Conditional rebates settled, but $400M matter of naked restrictions remains

It's about time Intel, AMD dropped x86 games and turned to the real threat

Have recent troubles finally humbled Chipzilla?

Intel lets go of 2,000 staff at Oregon R&D site, offices in Texas, Arizona, California

Layoffs follow more than 7,500 voluntary departures, early retirements

Arrow Lake splashdown: Intel pins hopes on replacement for Raptors

New silicon, new architecture, and loads of new motherboards rise to support it, but will power be anchored down?

Tech firms to pay millions in SEC penalties for misleading SolarWinds disclosures

Unisys, Avaya, Check Point, and Mimecast settled with the agency without admitting or denying wrongdoing