Detecting LogoFAIL Vulnerabilities and Exploits at Enterprise Scale - Eclypsium | Supply Chain Security for the Modern Enterprise (2024)

IT security teams are assessing new UEFI vulnerabilities that affect Windows and Linux systems. The vulnerabilities are collectively called LogoFAIL because they exist in UEFI image parsers that display the manufacturer logo when the system boots up.

Affected vendors include UEFI suppliers AMI, Insyde, and Phoenix and device manufacturers such as Lenovo, Dell, and HP. Some vendors have already issued advisories, but we should expect the list to expand as more vendors assess their exposure.

While we are not aware of exploitation in the wild, Eclypsium customers will be able to detect the vulnerabilities as well as indicators of potential exploits of the LogoFAIL vulnerabilities with the version 3.4 release. Eclypsium can also assist in the remediation process by identifying vulnerable components and automating firmware updates.

LogoFAIL Summary

Exploiting LogoFAIL vulnerabilities requires attackers to replace the logo image with a malicious look-alike that includes specially crafted code to exploit vulnerabilities in the UEFI image parsers. Because the exploitation occurs in the Driver Execution Environment (DXE), a very early stage of the boot process, it can bypass built-in security protections such as Secure Boot. Attackers can run arbitrary code before the operating system and any endpoint security agents that might be installed on the device.

LogoFAIL CVEs and Severity Scores

Defenders need to know which systems are affected by LogoFAIL vulnerabilities and the associated severity. The CERT Coordination Center at Carnegie Mellon has a dynamic list of affected vendors and associated security advisories.

So far, it is difficult to determine the severity as no public exploit has been published, and some of the now public vulnerabilities have been scored differently by the researchers from Binarly who discovered the LogoFAIL vulnerabilities, the UEFI firmware vendors (Phoenix Technologies, Insyde, and AMI), and the National Vulnerability Database (NVD). The severity and exploitability of each LogoFAIL vulnerability will likely depend on how affected firmware vendors and equipment manufacturers (OEMs) store and process logo images. An attacker’s ability to modify these logo images or paths to them may depend on malicious software running locally on a system (with administrative or root-level privileges), by an attacker remotely accessing the system, or by an attacker who gained physical access to a target.

You should monitor and apply patches as they become available from each OEM for each product model. As of the time of this writing, the list of affected products that have associated CVE identifiers includes the following:

Insyde

Insyde has issued INSYDE-SA-2023053 and assigned it a CVSS score of 4.4. The associated CVE is CVE-2023-40238 and has been scored a CVSS 5.5 (Medium) by the NVD. The aforementioned CVE correlates to Binarly’s vulnerability identifier BRLY-LOGOFAIL-2023-006 with an assigned CVSS of 8.2 (High). The difference in CVSS score appears to result from differences in perceived potential impact on confidentiality, integrity, and availability.

AMI

AMI has issued AMI-SA-2023009 and assigned a score of 7.5 to each of the associated CVEs, while the NVD has assigned a score of 7.8:

The severity rating for the AMI vulnerabilities is higher than the CVE in Insyde firmware due to stated impact on confidentiality and integrity.

Phoenix Technologies

Phoenix Technologies has released an advisory and the associated CVE (CVE-2023-5058) has been issued. At the time of this writing, no CVSS scores have been provided.

While Phoenix has encouraged customers to upgrade to the latest version of firmware, it is unclear when patches from all vendors will be available to customers.

Detection and Recommendations

LogoFAIL represents a class of vulnerabilities in image parsing functionality of UEFI firmware in Windows and Linux systems. While firmware vendors have issued advisories, the scope of the impact and severity of these vulnerabilities on various systems will become clear as more affected OEMs publish advisories and release updates. It’s important to look for new advisories and plan to install new updates as they are published by OEMs. In the meantime, Eclypsium has added detection of specific instances of LogoFAIL vulnerabilities affecting AMI, Phoenix Technologies, Insyde-based UEFI firmware on PC and server systems. We are also working on adding a capability to monitor systems for potential exploitation of the LogoFAIL class of vulnerabilities. As more advisories become available from OEMs and as proof-of-concept exploits become available we will be adding detection of both vulnerabilities and indicators of compromise/exploitation.

Detecting LogoFAIL Vulnerabilities and Exploits at Enterprise Scale - Eclypsium | Supply Chain Security for the Modern Enterprise (2)

Eclypsium customers who are configured to use the Automated Firmware Update capability will start receiving notifications about the new firmware updates as they are published by OEMs, verified, tested, and added to the Eclypsium platform.

Keep up to date with threats to low-level components such as UEFI by subscribing to our newsletter.

Back to Blog

Detecting LogoFAIL Vulnerabilities and Exploits at Enterprise Scale - Eclypsium | Supply Chain Security for the Modern Enterprise (2024)

FAQs

What is the process of finding vulnerabilities and exploiting them? ›

Explanation: The process of finding vulnerabilities and exploiting them using exploitable scripts or programs are known as exploitation. Vulnerability scanners such as Nexpose and Nessus are used for finding such vulnerabilities and then they are exploited using such programs and scripts.

How does LogoFAIL work? ›

LogoFAIL allows attackers to install a bootkit, which is a stealthy type of malware which runs before the operating system is loaded. This would allow attackers to bypass many endpoint security solutions. It also allows the malicious code to persist even after the device is reimaged.

What are the 4 stages of identifying vulnerabilities? ›

4 Steps of the Vulnerability Management Process
  • Perform Vulnerability Scan.
  • Assess Vulnerability Risk.
  • Prioritize & Address Vulnerabilities.
  • Continuous Vulnerability Management.

What are the methods of identifying vulnerabilities? ›

Network-based vulnerability assessments typically involve specialized software tools and techniques that scan the network for vulnerabilities. These tools may use various methods to identify vulnerabilities, such as port scanning, vulnerability scanning, password cracking, and network mapping.

What is LogoFAIL vulnerabilities? ›

They're called LogoFAIL vulnerabilities, and they arise from flaws in image parsing libraries embedded in UEFI system firmware. These libraries are used to display logos during the boot process or in BIOS setup. The specific vulnerabilities identified include heap-based buffer overflow flaws and out-of-bounds reads.

What devices are affected by LogoFAIL? ›

Which devices are affected by LogoFAIL? Hundreds of consumer and enterprise-grade devices from various vendors, including Intel, Acer, and Lenovo, are potentially vulnerable.

Is my computer vulnerable to LogoFAIL? ›

Nearly all commercially available computers are vulnerable to a flaw in the process used to display a logo upon start-up. A set of major vulnerabilities that impact nearly all devices allows hackers to bypass most modern security checks through the logo that shows up when the computer starts.

What is the process of vulnerability? ›

As a process, vulnerability management entails identifying, assessing, and prioritizing security vulnerabilities across systems, workloads, and endpoints. After the vulnerabilities have been classified, the process typically delves into remediation, reporting, and resolving the uncovered threats satisfactorily.

What is exploiting vulnerability? ›

Exploitation is the next step in an attacker's playbook after finding a vulnerability. Exploits are the means through which a vulnerability can be leveraged for malicious activity by hackers; these include pieces of software, sequences of commands, or even open-source exploit kits.

What is vulnerability exploitation? ›

A vulnerability is a weakness that can be exploited by cybercriminals to gain unauthorized access to a computer system. After exploiting a vulnerability, a cyberattack can run malicious code, install malware, and even steal sensitive data.

What does IT mean when a vulnerability is exploited? ›

Vulnerability : A vulnerability is a weakness in a system, network or application. Exploit : A tool used to take advantage of the vulnerability. In simple terms, a vulnerability can be defined as a weakness or flaw in a system or software that can potentially be exploited to compromise its security.

References

Top Articles
Latest Posts
Article information

Author: Tish Haag

Last Updated:

Views: 6196

Rating: 4.7 / 5 (67 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Tish Haag

Birthday: 1999-11-18

Address: 30256 Tara Expressway, Kutchburgh, VT 92892-0078

Phone: +4215847628708

Job: Internal Consulting Engineer

Hobby: Roller skating, Roller skating, Kayaking, Flying, Graffiti, Ghost hunting, scrapbook

Introduction: My name is Tish Haag, I am a excited, delightful, curious, beautiful, agreeable, enchanting, fancy person who loves writing and wants to share my knowledge and understanding with you.