Windows and Linux devices vulnerable to new LogoFAIL firmware attack


  • Staff

 Ars Technica:

Hundreds of Windows and Linux computer models from virtually all hardware makers are vulnerable to a new attack that executes malicious firmware early in the boot-up sequence, a feat that allows infections that are nearly impossible to detect or remove using current defense mechanisms.

The attack—dubbed LogoFAIL by the researchers who devised it—is notable for the relative ease in carrying it out, the breadth of both consumer- and enterprise-grade models that are susceptible, and the high level of control it gains over them. In many cases, LogoFAIL can be remotely executed in post-exploit situations using techniques that can’t be spotted by traditional endpoint security products. And because exploits run during the earliest stages of the boot process, they are able to bypass a host of defenses, including the industry-wide Secure Boot, Intel’s Secure Boot, and similar protections from other companies that are devised to prevent so-called bootkit infections.

Game over for platform security​

LogoFAIL is a constellation of two dozen newly discovered vulnerabilities that have lurked for years, if not decades, in Unified Extensible Firmware Interfaces responsible for booting modern devices that run Windows or Linux. The vulnerabilities are the product of almost a year’s worth of work by Binarly, a firm that helps customers identify and secure vulnerable firmware.

The vulnerabilities are the subject of a coordinated mass disclosure released Wednesday. The participating companies comprise nearly the entirety of the x64 and ARM CPU ecosystem, starting with UEFI suppliers AMI, Insyde, and Phoenix (sometimes still called IBVs or independent BIOS vendors); device manufacturers such as Lenovo, Dell, and HP; and the makers of the CPUs that go inside the devices, usually Intel, AMD or designers of ARM CPUs. The researchers unveiled the attack on Wednesday at the Black Hat Security Conference in London.

The affected parties are releasing advisories that disclose which of their products are vulnerable and where to obtain security patches. Links to advisories and a list of vulnerability designations appears at the end of this article.

As its name suggests, LogoFAIL involves logos, specifically those of the hardware seller that are displayed on the device screen early in the boot process, while the UEFI is still running. Image parsers in UEFIs from all three major IBVs are riddled with roughly a dozen critical vulnerabilities that have gone unnoticed until now. By replacing the legitimate logo images with identical-looking ones that have been specially crafted to exploit these bugs, LogoFAIL makes it possible to execute malicious code at the most sensitive stage of the boot process, which is known as DXE, short for Driver Execution Environment.

“Once arbitrary code execution is achieved during the DXE phase, it’s game over for platform security,” researchers from Binarly, the security firm that discovered the vulnerabilities, wrote in a whitepaper. “From this stage, we have full control over the memory and the disk of the target device, thus including the operating system that will be started.”

From there, LogoFAIL can deliver a second-stage payload that drops an executable onto the hard drive before the main OS has even started. The following video demonstrates a proof-of-concept exploit created by the researchers. The infected device—a Gen 2 Lenovo ThinkCentre M70s running an 11th-Gen Intel Core with a UEFI released in June—runs standard firmware defenses, including Secure Boot and Intel Boot Guard.



 Read more:

 

Attachments

  • Windows_Security.png
    Windows_Security.png
    6 KB · Views: 0
Last edited:
"The torture never stops"

~Frank Zappa (song: The Torture Never Stops)




they are able to bypass a host of defenses, including the industry-wide Secure Boot, Intel’s Secure Boot, and similar protections from other companies that are devised to prevent so-called bootkit infections.


Well, the glorious Secure Boot required by Microsoft didn't last very long. :/



Side Note...

I just flashed my BIOS to 4702, and for good measure, just redid the Revocations.
One change I noticed was the DBX Key stuffies...


Image2.jpg
 
Last edited:

My Computers

System One System Two

  • OS
    Win 11 Home ♦♦♦22631.3527 ♦♦♦♦♦♦♦23H2
    Computer type
    PC/Desktop
    Manufacturer/Model
    Built by Ghot® [May 2020]
    CPU
    AMD Ryzen 7 3700X
    Motherboard
    Asus Pro WS X570-ACE (BIOS 4702)
    Memory
    G.Skill (F4-3200C14D-16GTZKW)
    Graphics Card(s)
    EVGA RTX 2070 (08G-P4-2171-KR)
    Sound Card
    Realtek ALC1220P / ALC S1220A
    Monitor(s) Displays
    Dell U3011 30"
    Screen Resolution
    2560 x 1600
    Hard Drives
    2x Samsung 860 EVO 500GB,
    WD 4TB Black FZBX - SATA III,
    WD 8TB Black FZBX - SATA III,
    DRW-24B1ST CD/DVD Burner
    PSU
    PC Power & Cooling 750W Quad EPS12V
    Case
    Cooler Master ATCS 840 Tower
    Cooling
    CM Hyper 212 EVO (push/pull)
    Keyboard
    Ducky DK9008 Shine II Blue LED
    Mouse
    Logitech Optical M-100
    Internet Speed
    300/300
    Browser
    Firefox (latest)
    Antivirus
    Bitdefender Internet Security
    Other Info
    Speakers: Klipsch Pro Media 2.1
  • Operating System
    Windows XP Pro 32bit w/SP3
    Computer type
    PC/Desktop
    Manufacturer/Model
    Built by Ghot® (not in use)
    CPU
    AMD Athlon 64 X2 5000+ (OC'd @ 3.2Ghz)
    Motherboard
    ASUS M2N32-SLI Deluxe Wireless Edition
    Memory
    TWIN2X2048-6400C4DHX (2 x 1GB, DDR2 800)
    Graphics card(s)
    EVGA 256-P2-N758-TR GeForce 8600GT SSC
    Sound Card
    Onboard
    Monitor(s) Displays
    ViewSonic G90FB Black 19" Professional (CRT)
    Screen Resolution
    up to 2048 x 1536
    Hard Drives
    WD 36GB 10,000rpm Raptor SATA
    Seagate 80GB 7200rpm SATA
    Lite-On LTR-52246S CD/RW
    Lite-On LH-18A1P CD/DVD Burner
    PSU
    PC Power & Cooling Silencer 750 Quad EPS12V
    Case
    Generic Beige case, 80mm fans
    Cooling
    ZALMAN 9500A 92mm CPU Cooler
    Mouse
    Logitech Optical M-BT96a
    Keyboard
    Logitech Classic Keybooard 200
    Internet Speed
    300/300
    Browser
    Firefox 3.x ??
    Antivirus
    Symantec (Norton)
    Other Info
    Still assembled, still runs. Haven't turned it on for 13 years?
Does disabling the boot logo image not prevent this problem?
 

My Computer

System One

  • OS
    Windows 11 Pro 23H2 (RP channel)
    Computer type
    PC/Desktop
    Manufacturer/Model
    Gigabyte
    CPU
    AMD Ryzen 5900X 12-core
    Motherboard
    X570 Aorus Xtreme
    Memory
    64GB Corsair Platinum RGB 3600MHz CL16
    Graphics Card(s)
    MSI Suprim X 3080 Ti
    Sound Card
    Soundblaster AE-5 Plus
    Monitor(s) Displays
    ASUS TUF Gaming VG289Q
    Screen Resolution
    3840x2160
    Hard Drives
    Samsung 990 Pro 2TB
    Samsung 980 Pro 2TB
    Samsung 970 Evo Plus 1TB
    Samsung 870 Evo 4TB
    Samsung T7 Touch 1TB
    PSU
    Asus ROG Strix 1000W
    Case
    Corsair D750 Airflow
    Cooling
    Noctua NH-D15S
    Keyboard
    Asus ROG Flare
    Mouse
    Logitech G903 with PowerPlay charger
    Internet Speed
    500Mb/sec
    Browser
    Microsoft Edge
    Antivirus
    Windows Defender
If you are a Dell Dude: "Many devices sold by Dell aren't directly exploitable because the image files are protected by Intel Boot Guard, making it impossible to be replaced, even during a physical attack. As a further measure, many Dell devices don't permit logo customization."
 

My Computer

System One

  • OS
    Windows 11
    Computer type
    PC/Desktop
    Manufacturer/Model
    Home Built
    CPU
    AMD Ryzen 5 2600
    Motherboard
    Gigabyte
    Memory
    16 GB G-Skill
    Graphics Card(s)
    Nvidia 3060ti
    Monitor(s) Displays
    27 inch Westinghouse
    Screen Resolution
    1920X1080
    Hard Drives
    512 GB Samsung M2 980
    2 X 1TB Western Digital Black HDs
    Case
    Thermaltake
    Internet Speed
    250mbs
Does disabling the boot logo image not prevent this problem?


I don't believe so. I've had the boot logo disabled since the XP days.
Every time you flash the BIOS (at least on an ASUS board) the boot logo is back again.

I have to re-disable the boot logo after every BIOS flash.
Every time I flash the BIOS, all the settings are back to the defaults.



Google: logofail vulnerability ...to read more articles.



Many OEMs, such as Dell, do not allow their logos to be changed in the UEFI — and their image files are protected by Image Boot Guard; these systems are therefore immune to this exploit. Macs, whose hardware and software are developed in-house by Apple, have logo images hardcoded into the UEFI and are similarly protected. This is also the case for Macs running on Intel CPUs (hardcoded logo images), and so those Macs are also safe.

If your system integrator does not allow for rewriting boot images in its BIOS, you should be fine. But for everyone else, this is an exploit that needs to be patched by both motherboard manufacturers and OEMs, as the research shows both are vulnerable. The only way to protect the image parsing in your system's UEFI is by installing a new UEFI security patch, which you'll need to get from your motherboard manufacturer or OEM (who will get it from the IBV).

AMI, Insyde, and Lenovo, among others, have published advisories, but there's no complete list of affected companies — to see if your system is vulnerable, you'll need to check with your OEM/motherboard manufacturer.



Maybe @MoKiChU has some more info about this? He's the guy with all the drivers topics.
I looked on the ASUS motherboard forums... and I see no mention of LogoFAIL... yet.
 
Last edited:

My Computers

System One System Two

  • OS
    Win 11 Home ♦♦♦22631.3527 ♦♦♦♦♦♦♦23H2
    Computer type
    PC/Desktop
    Manufacturer/Model
    Built by Ghot® [May 2020]
    CPU
    AMD Ryzen 7 3700X
    Motherboard
    Asus Pro WS X570-ACE (BIOS 4702)
    Memory
    G.Skill (F4-3200C14D-16GTZKW)
    Graphics Card(s)
    EVGA RTX 2070 (08G-P4-2171-KR)
    Sound Card
    Realtek ALC1220P / ALC S1220A
    Monitor(s) Displays
    Dell U3011 30"
    Screen Resolution
    2560 x 1600
    Hard Drives
    2x Samsung 860 EVO 500GB,
    WD 4TB Black FZBX - SATA III,
    WD 8TB Black FZBX - SATA III,
    DRW-24B1ST CD/DVD Burner
    PSU
    PC Power & Cooling 750W Quad EPS12V
    Case
    Cooler Master ATCS 840 Tower
    Cooling
    CM Hyper 212 EVO (push/pull)
    Keyboard
    Ducky DK9008 Shine II Blue LED
    Mouse
    Logitech Optical M-100
    Internet Speed
    300/300
    Browser
    Firefox (latest)
    Antivirus
    Bitdefender Internet Security
    Other Info
    Speakers: Klipsch Pro Media 2.1
  • Operating System
    Windows XP Pro 32bit w/SP3
    Computer type
    PC/Desktop
    Manufacturer/Model
    Built by Ghot® (not in use)
    CPU
    AMD Athlon 64 X2 5000+ (OC'd @ 3.2Ghz)
    Motherboard
    ASUS M2N32-SLI Deluxe Wireless Edition
    Memory
    TWIN2X2048-6400C4DHX (2 x 1GB, DDR2 800)
    Graphics card(s)
    EVGA 256-P2-N758-TR GeForce 8600GT SSC
    Sound Card
    Onboard
    Monitor(s) Displays
    ViewSonic G90FB Black 19" Professional (CRT)
    Screen Resolution
    up to 2048 x 1536
    Hard Drives
    WD 36GB 10,000rpm Raptor SATA
    Seagate 80GB 7200rpm SATA
    Lite-On LTR-52246S CD/RW
    Lite-On LH-18A1P CD/DVD Burner
    PSU
    PC Power & Cooling Silencer 750 Quad EPS12V
    Case
    Generic Beige case, 80mm fans
    Cooling
    ZALMAN 9500A 92mm CPU Cooler
    Mouse
    Logitech Optical M-BT96a
    Keyboard
    Logitech Classic Keybooard 200
    Internet Speed
    300/300
    Browser
    Firefox 3.x ??
    Antivirus
    Symantec (Norton)
    Other Info
    Still assembled, still runs. Haven't turned it on for 13 years?
MSI doesn't have anything new for my mobo, yet, last is from 17 Oct.

I'll keep checking over the next several days, but I suspect they will be slow about it as they always have been.
 

My Computers

System One System Two

  • OS
    Windows 11 23H2 Current build
    Computer type
    PC/Desktop
    Manufacturer/Model
    HomeBrew
    CPU
    AMD Ryzen 9 3950X
    Motherboard
    MSI MEG X570 GODLIKE
    Memory
    4 * 32 GB - Corsair Vengeance 3600 MHz
    Graphics Card(s)
    EVGA GeForce RTX 3080 Ti XC3 ULTRA GAMING (12G-P5-3955-KR)
    Sound Card
    Realtek® ALC1220 Codec
    Monitor(s) Displays
    2x Eve Spectrum ES07D03 4K Gaming Monitor (Matte) | Eve Spectrum ES07DC9 4K Gaming Monitor (Glossy)
    Screen Resolution
    3x 3840 x 2160
    Hard Drives
    3x Samsung 980 Pro NVMe PCIe 4 M.2 2 TB SSD (MZ-V8P2T0B/AM) } 3x Sabrent Rocket NVMe 4.0 1 TB SSD (USB)
    PSU
    PC Power & Cooling’s Silencer Series 1050 Watt, 80 Plus Platinum
    Case
    Fractal Design Define 7 XL Dark ATX Full Tower Case
    Cooling
    NZXT KRAKEN Z73 73.11 CFM Liquid CPU Cooler (3x 120 mm push top) + Air 3x 140mm case fans (pull front) + 1x 120 mm (push back) and 1 x 120 mm (pull bottom)
    Keyboard
    SteelSeries Apex Pro Wired Gaming Keyboard
    Mouse
    Logitech MX Master 3S | MX Master 3 for Business
    Internet Speed
    AT&T LightSpeed Gigabit Duplex Ftth
    Browser
    Nightly (default) + Firefox (stable), Chrome, Edge
    Antivirus
    Defender + MB 5 Beta
  • Operating System
    ChromeOS Flex Dev Channel (current)
    Computer type
    Laptop
    Manufacturer/Model
    Dell Latitude E5470
    CPU
    Intel(R) Core(TM) i5-6300U CPU @ 2.40GHz, 2501 Mhz, 2 Core(s), 4 Logical Processor(s)
    Motherboard
    Dell
    Memory
    16 GB
    Graphics card(s)
    Intel(R) HD Graphics 520
    Sound Card
    Intel(R) HD Graphics 520 + RealTek Audio
    Monitor(s) Displays
    Dell laptop display 15"
    Screen Resolution
    1920 * 1080
    Hard Drives
    Toshiba 128GB M.2 22300 drive
    INTEL Cherryville 520 Series SSDSC2CW180A 180 GB SATA III SSD
    PSU
    Dell
    Case
    Dell
    Cooling
    Dell
    Mouse
    Logitech MX Master 3S (shared w. Sys 1) | Dell TouchPad
    Keyboard
    Dell
    Internet Speed
    AT&T LightSpeed Gigabit Duplex Ftth
Does disabling the boot logo image not prevent this problem?
I wouldn't think so. What you have then is a false on DisplayLogo, but not a false on ChangeLogo or some such. According to the article Ghot quotes this is what Dell and Apple have done where they, "do not allow their logos to be changed in the UEFI...."
 

My Computers

System One System Two

  • OS
    Windows 11 Pro 23H2
    Computer type
    PC/Desktop
    Manufacturer/Model
    Wordsworth 10000
    CPU
    Core i7 10700K 3.8 GHz
    Motherboard
    Asus ROG Strix Z590-A Gaming Wifi
    Memory
    Corsair Vengeance LPX DDR4 64GB 3000MHz
    Graphics Card(s)
    Asus Radeon RX480 Strix 8GB
    Sound Card
    Asus Xonar DSX
    Monitor(s) Displays
    HP 2709m
    Screen Resolution
    1920x1080
    Hard Drives
    Samsung 980 Pro M.2 SSD 500GB; Samsung 980 M.2 SSD 1TB
    PSU
    Thermaltake Toughpower Grand Platinum 850W
    Case
    Fractal Design Meshify 2
    Cooling
    CPU-Noctua NH D15 Chromax, GPU-Stock, Case-Noctua Chromax 3x140
    Keyboard
    Microsoft Natural Ergo 4000
    Mouse
    HP X500
    Internet Speed
    Cable
    Browser
    Vivaldi, MS Edge
    Antivirus
    Malwarebytes 4.4.3, Windows Defender
    Other Info
    Klipsch Promedia 5.1 THX
    Asus External Blu-Ray 16D1X-USB 3.0
  • Operating System
    Windows 11 Pro 23H2
    Computer type
    PC/Desktop
    Manufacturer/Model
    Wordsworth 6000
    CPU
    Core i7 6700K 4.0 GHz
    Motherboard
    Asus Z170 Pro
    Memory
    Corsair Vengeance LPX DDR4 32GB 3000MHz
    Graphics card(s)
    Asus GeForce GTX 1050 Ti
    Sound Card
    Asus Xonar SE
    Monitor(s) Displays
    HP X24ih
    Screen Resolution
    1920x1080
    Hard Drives
    Intel 760p M.2 SSD 500GB; Intel 540 SSD 480GB; Intel 335 SSD 240GB
    PSU
    Thermaltake Toughpower GF1 750W
    Case
    Lian Li PC-B70
    Cooling
    CPU- Noctua NH-D15; GPU-Stock; Case-Noctua Chromax 2x140, 2x120
    Mouse
    Microsoft Wireless Comfort 5050
    Keyboard
    Microsoft Wireless Comfort 5050
    Internet Speed
    Cable
    Browser
    Vivaldi, MS Edge
    Antivirus
    Malwarebytes 4.4.3, Windows Defender
    Other Info
    HP bd 340
    HP bd 240
    Denon DRA-800H
    Klipsch RP-600M
    Klipsch R-100SW (2)

    System 3 Specs
    Core i7 10700K 3.8 GHz
    Asus ROG Strix Z590-A Gaming Wifi
    Corsair Vengeance LPX DDR4 32GB 3200MHz
    Asus Radeon RX560 Dual 4GB
    Xonar SE
    Samsung 980 Pro M.2 SSD 1 TB (2)
    Thermaltake Toughpower GF3 850W
    Fractal Design Meshify 2
    CPU-Noctua NH D15 Chromax, GPU-Stock, Case-Noctua Chromax 2x140,1x120

My Computers

System One System Two

  • OS
    11 Home
    Computer type
    Laptop
    Manufacturer/Model
    Asus TUF Gaming (2024)
    CPU
    i7 13650HX
    Memory
    16GB DDR5
    Graphics Card(s)
    GeForce RTX 4060 Mobile
    Sound Card
    Eastern Electric MiniMax DAC Supreme; Emotiva UMC-200; Astell & Kern AK240
    Monitor(s) Displays
    Sony Bravia XR-55X90J
    Screen Resolution
    3840×2160
    Hard Drives
    512GB SSD internal
    37TB external
    PSU
    Li-ion
    Cooling
    2× Arc Flow Fans, 4× exhaust vents, 5× heatpipes
    Keyboard
    Logitech K800
    Mouse
    Logitech G402
    Internet Speed
    20Mbit/s up, 250Mbit/s down
    Browser
    FF
  • Operating System
    11 Home
    Computer type
    Laptop
    Manufacturer/Model
    Medion S15450
    CPU
    i5 1135G7
    Memory
    16GB DDR4
    Graphics card(s)
    Intel Iris Xe
    Sound Card
    Eastern Electric MiniMax DAC Supreme; Emotiva UMC-200; Astell & Kern AK240
    Monitor(s) Displays
    Sony Bravia XR-55X90J
    Screen Resolution
    3840×2160
    Hard Drives
    2TB SSD internal
    37TB external
    PSU
    Li-ion
    Mouse
    Logitech G402
    Keyboard
    Logitech K800
    Internet Speed
    20Mbit/s up, 250Mbit/s down
    Browser
    FF
I wannacry! We still have pen, paper and envelopes.
 

My Computer

System One

  • OS
    Windows 11 Pro
    Computer type
    PC/Desktop
    Manufacturer/Model
    Self build
    CPU
    Core i7-13700K
    Motherboard
    Asus TUF Gaming Plus WiFi Z790
    Memory
    64 GB Kingston Fury Beast DDR5
    Graphics Card(s)
    Gigabyte GeForce RTX 2060 Super Gaming OC 8G
    Sound Card
    Realtek S1200A
    Monitor(s) Displays
    Viewsonic VP2770
    Screen Resolution
    2560 x 1440
    Hard Drives
    Kingston KC3000 2TB NVME SSD & SATA HDDs & SSD
    PSU
    EVGA SuperNova G2 850W
    Case
    Nanoxia Deep Silence 1
    Cooling
    Noctua NH-D14
    Keyboard
    Microsoft Digital Media Pro
    Mouse
    Logitech Wireless
    Internet Speed
    50 Mb / s
    Browser
    Chrome
    Antivirus
    Defender
What I did not find in all the reports I read until now, is how the attack has to be done in a system.
Can it be done remotely or has there be someone physically at the system bringing in the changes in the UEFI by special software?
And if so, in what stage of the system boot should it be done?

If a system is used at home by just one person that's reliable, how can an image in the UEFI then be changed?
 

My Computer

System One

  • OS
    Windows 11 Pro 23H2 22631.3447
    Computer type
    PC/Desktop
    Manufacturer/Model
    Build by vendor to my specs
    CPU
    AMD Ryzen 7 5700G
    Motherboard
    MSI PRO B550M-P Gen3
    Memory
    Kingston FURY Beast 2x16GB DIMM DDR4 2666 CL16
    Graphics Card(s)
    MSI GeForce GT 730 2GB LP V1
    Sound Card
    Creative Sound Blaster Audigy FX
    Monitor(s) Displays
    Samsung S24E450F 24"
    Screen Resolution
    1920 x 1080
    Hard Drives
    1. SSD Kingston NV2 - 500 GB
    2. SSD-SATA Crucial MX500-2TB
    PSU
    Corsair CV650W
    Case
    Cooler Master Silencio S400
    Cooling
    Cooler Master Hyper H412R
    Keyboard
    Cherry Stream (wired, scissor keys)
    Mouse
    Asus WT465 (wireless)
    Internet Speed
    70 Mbps down / 80 Mbps up
    Browser
    Firefox 115.7.0 ESR
    Antivirus
    F-secure via Internet provider
    Other Info
    Oracle VirtualBox 7 for testing software on Win 10 or 11
Contrary to popular belief, Secure Boot never was designed to, by itself, prevent so-called bootkit infections. See: Windows Measured Boot - How It Helps To Secure Windows OS Platform HTMD Blog

As for the Intel Boot Guard...

View attachment 80308
Different infos about Intel Boot Guard,

"From there, LogoFAIL can deliver a second-stage payload that drops an executable onto the hard drive before the main OS has even started. The following video demonstrates a proof-of-concept exploit created by the researchers. The infected device—a Gen 2 Lenovo ThinkCentre M70s running an 11th-Gen Intel Core with a UEFI released in June—runs standard firmware defenses, including Secure Boot and Intel Boot Guard"
 

My Computers

System One System Two

  • OS
    Win 11 Pro & 🐥.
    Computer type
    Laptop
    Manufacturer/Model
    ASUS VivoBook
    CPU
    AMD Ryzen 7 3700U with Radeon Vega Mobile Gfx
    Motherboard
    ASUSTeK COMPUTER INC. X509DA (FP5)
    Memory
    12GB
    Graphics Card(s)
    RX Vega 10 Graphics
    Monitor(s) Displays
    Generic PnP Monitor (1920x1080@60Hz)
    Screen Resolution
    1920x1080@60Hz
    Hard Drives
    Samsung SSD 970 EVO Plus 2TB NVMe 1.3
    Internet Speed
    25 Mbps
    Browser
    Edge
    Antivirus
    Defender
  • Operating System
    Windows 11
    Computer type
    Laptop
    Manufacturer/Model
    ACER NITRO
    CPU
    AMD Ryzen 7 5800H / 3.2 GHz
    Motherboard
    CZ Scala_CAS (FP6)
    Memory
    32 GB DDR4 SDRAM 3200 MHz
    Graphics card(s)
    NVIDIA GeForce RTX 3060 6 GB GDDR6 SDRAM
    Sound Card
    Realtek Audio. NVIDIA High Definition Audio
    Monitor(s) Displays
    15.6" LED backlight 1920 x 1080 (Full HD) 144 Hz
    Screen Resolution
    1920 x 1080 (Full HD)
    Hard Drives
    Samsung 970 Evo Plus 2TB NVMe M.2
    PSU
    180 Watt, 19.5 V
    Mouse
    Lenovo Bluetooth
    Internet Speed
    25 Mbps
    Browser
    Edge
    Antivirus
    Defender
I don't believe so. I've had the boot logo disabled since the XP days.
Every time you flash the BIOS (at least on an ASUS board) the boot logo is back again.

I have to re-disable the boot logo after every BIOS flash.
Every time I flash the BIOS, all the settings are back to the defaults.

I don't believe so. I've had the boot logo disabled since the XP days.
Every time you flash the BIOS (at least on an ASUS board) the boot logo is back again.

I have to re-disable the boot logo after every BIOS flash.
Every time I flash the BIOS, all the settings are back to the defaults.



Google: logofail vulnerability ...to read more articles.







Maybe @MoKiChU has some more info about this? He's the guy with all the drivers topics.
I looked on the ASUS motherboard forums... and I see no mention of LogoFAIL... yet.
Yes whenever I flash new BIOS I always do a CMOS reset, and then reconfigure it. One of the things I do is disable the Aorus boot logo. I *think* Gigabyte boards can have a custom boot logo but I've never changed it myself.
 

My Computer

System One

  • OS
    Windows 11 Pro 23H2 (RP channel)
    Computer type
    PC/Desktop
    Manufacturer/Model
    Gigabyte
    CPU
    AMD Ryzen 5900X 12-core
    Motherboard
    X570 Aorus Xtreme
    Memory
    64GB Corsair Platinum RGB 3600MHz CL16
    Graphics Card(s)
    MSI Suprim X 3080 Ti
    Sound Card
    Soundblaster AE-5 Plus
    Monitor(s) Displays
    ASUS TUF Gaming VG289Q
    Screen Resolution
    3840x2160
    Hard Drives
    Samsung 990 Pro 2TB
    Samsung 980 Pro 2TB
    Samsung 970 Evo Plus 1TB
    Samsung 870 Evo 4TB
    Samsung T7 Touch 1TB
    PSU
    Asus ROG Strix 1000W
    Case
    Corsair D750 Airflow
    Cooling
    Noctua NH-D15S
    Keyboard
    Asus ROG Flare
    Mouse
    Logitech G903 with PowerPlay charger
    Internet Speed
    500Mb/sec
    Browser
    Microsoft Edge
    Antivirus
    Windows Defender
So Apple pc's are not affected by these vulnerabilities?
 

My Computer

System One

  • OS
    Windows 11/Linux Mint
    Computer type
    PC/Desktop
    Manufacturer/Model
    Dell Optiplex 960
    CPU
    Intel Core 2 Duo CPU E8400 @ 3.00 GHz x 2
    Memory
    8 GB
    Graphics Card(s)
    Intel 4 Series Chipset Integrated Graphics Controller
    Monitor(s) Displays
    HP x22LED
    Hard Drives
    Crucial 250 GB SSD, HD 1Tb
So Apple pc's are not affected by these vulnerabilities?
It would appear so, according to the article Ghot quotes in post #5 above, "Macs, whose hardware and software are developed in-house by Apple, have logo images hardcoded into the UEFI and are similarly protected. This is also the case for Macs running on Intel CPUs (hardcoded logo images), and so those Macs are also safe."
 

My Computers

System One System Two

  • OS
    Windows 11 Pro 23H2
    Computer type
    PC/Desktop
    Manufacturer/Model
    Wordsworth 10000
    CPU
    Core i7 10700K 3.8 GHz
    Motherboard
    Asus ROG Strix Z590-A Gaming Wifi
    Memory
    Corsair Vengeance LPX DDR4 64GB 3000MHz
    Graphics Card(s)
    Asus Radeon RX480 Strix 8GB
    Sound Card
    Asus Xonar DSX
    Monitor(s) Displays
    HP 2709m
    Screen Resolution
    1920x1080
    Hard Drives
    Samsung 980 Pro M.2 SSD 500GB; Samsung 980 M.2 SSD 1TB
    PSU
    Thermaltake Toughpower Grand Platinum 850W
    Case
    Fractal Design Meshify 2
    Cooling
    CPU-Noctua NH D15 Chromax, GPU-Stock, Case-Noctua Chromax 3x140
    Keyboard
    Microsoft Natural Ergo 4000
    Mouse
    HP X500
    Internet Speed
    Cable
    Browser
    Vivaldi, MS Edge
    Antivirus
    Malwarebytes 4.4.3, Windows Defender
    Other Info
    Klipsch Promedia 5.1 THX
    Asus External Blu-Ray 16D1X-USB 3.0
  • Operating System
    Windows 11 Pro 23H2
    Computer type
    PC/Desktop
    Manufacturer/Model
    Wordsworth 6000
    CPU
    Core i7 6700K 4.0 GHz
    Motherboard
    Asus Z170 Pro
    Memory
    Corsair Vengeance LPX DDR4 32GB 3000MHz
    Graphics card(s)
    Asus GeForce GTX 1050 Ti
    Sound Card
    Asus Xonar SE
    Monitor(s) Displays
    HP X24ih
    Screen Resolution
    1920x1080
    Hard Drives
    Intel 760p M.2 SSD 500GB; Intel 540 SSD 480GB; Intel 335 SSD 240GB
    PSU
    Thermaltake Toughpower GF1 750W
    Case
    Lian Li PC-B70
    Cooling
    CPU- Noctua NH-D15; GPU-Stock; Case-Noctua Chromax 2x140, 2x120
    Mouse
    Microsoft Wireless Comfort 5050
    Keyboard
    Microsoft Wireless Comfort 5050
    Internet Speed
    Cable
    Browser
    Vivaldi, MS Edge
    Antivirus
    Malwarebytes 4.4.3, Windows Defender
    Other Info
    HP bd 340
    HP bd 240
    Denon DRA-800H
    Klipsch RP-600M
    Klipsch R-100SW (2)

    System 3 Specs
    Core i7 10700K 3.8 GHz
    Asus ROG Strix Z590-A Gaming Wifi
    Corsair Vengeance LPX DDR4 32GB 3200MHz
    Asus Radeon RX560 Dual 4GB
    Xonar SE
    Samsung 980 Pro M.2 SSD 1 TB (2)
    Thermaltake Toughpower GF3 850W
    Fractal Design Meshify 2
    CPU-Noctua NH D15 Chromax, GPU-Stock, Case-Noctua Chromax 2x140,1x120
It would appear so, according to the article Ghot quotes in post #5 above, "Macs, whose hardware and software are developed in-house by Apple, have logo images hardcoded into the UEFI and are similarly protected. This is also the case for Macs running on Intel CPUs (hardcoded logo images), and so those Macs are also safe."
Thanks, I missed it. Not a MAC user.... but do have an ipad. Anyway, it's interesting that they have their images hardcoded.
 

My Computer

System One

  • OS
    Windows 11/Linux Mint
    Computer type
    PC/Desktop
    Manufacturer/Model
    Dell Optiplex 960
    CPU
    Intel Core 2 Duo CPU E8400 @ 3.00 GHz x 2
    Memory
    8 GB
    Graphics Card(s)
    Intel 4 Series Chipset Integrated Graphics Controller
    Monitor(s) Displays
    HP x22LED
    Hard Drives
    Crucial 250 GB SSD, HD 1Tb
Does disabling the boot logo image not prevent this problem?
I had the same question.

It seems LogoFAIL exploits vulnerabilities in the image parser built into the UEFI. I'd expect that disabling display of the logo would mean the parser wouldn't run so these parser vulnerabilities couldn't be exploited. However, I assume the LogoFAIL installer could check for this, turn the logo display ON and provide a blank UEFI display which includes the exploit. So, it just makes the exploit a little more complex.

My understanding is that in order to modify the logo image they must first find a browser (or similar) exploit and use that to fiddle the image. So the target system has already been compromised and LogoFAIL seems to simply make it difficult to clear the problem -- likely requiring re-writing the BIOS including the image.
 

My Computers

System One System Two

  • OS
    Windows 11 Pro
    Computer type
    PC/Desktop
    Manufacturer/Model
    Home Built
    CPU
    Ryzen 5 5600G
    Motherboard
    Gigabyte B550 Aorus Pro AC
    Memory
    Ripjaws 2x8GB 3600
    Graphics Card(s)
    CPU internal
    Monitor(s) Displays
    Sharp LC-32D64U
    Screen Resolution
    1920 x 1080
    Hard Drives
    WD_Black SN770 250GB
    PSU
    Antec Earthwatts 380w
    Case
    Antec Sonata
    Cooling
    Scythe Mugen
    Keyboard
    Microsoft KU-0459
    Mouse
    Gaming Mouse (eBay)
    Internet Speed
    500/500
    Browser
    Firefox
    Antivirus
    Windows Defender
    Other Info
    Low noise, low power dissipation
  • Operating System
    Windows 10 Pro
    Computer type
    PC/Desktop
    Manufacturer/Model
    Home Built
    CPU
    AMD 5350
    Motherboard
    ASUS AM1I-A
    Memory
    8GB
    Monitor(s) Displays
    Dell
    Screen Resolution
    1920 x 1080
    Hard Drives
    Kingston 120GB SSD
    PSU
    Antec Earthwatts 380W
    Case
    Antec NSK 3180
    Cooling
    AMD
    Mouse
    Dell
    Keyboard
    Dell
    Internet Speed
    440/20
    Browser
    Firefox
    Antivirus
    Windows Defender
There's some good news...

Attackers need Administrative access to exploit this vulnerability, according to Ghacks.net



Attackers need to gain administrative access on target devices to exploit the vulnerability. This can be achieved through malicious payloads planted on the system, for instance by getting the user to run malicious software, or through exploits.

Once access is gained, the attacker would replace the vendors boot logo with a malicious logo, which the device would then load during boot.

Users on devices without firmware updates need to be extra cautious and use protections to avoid the initial attack on the device (which needs administrative access).


In other words... this is pretty much like other vulnerabilities. The USER has to fall for an exploit that will give the LogoFAIL hackers, Administrative access... first. THEN... the bad guys can use the LogoFAIL vulnerability.



THIS, "need for Administrative access", was not apparent in the original ARS Technica article.

@Brink
 

My Computers

System One System Two

  • OS
    Win 11 Home ♦♦♦22631.3527 ♦♦♦♦♦♦♦23H2
    Computer type
    PC/Desktop
    Manufacturer/Model
    Built by Ghot® [May 2020]
    CPU
    AMD Ryzen 7 3700X
    Motherboard
    Asus Pro WS X570-ACE (BIOS 4702)
    Memory
    G.Skill (F4-3200C14D-16GTZKW)
    Graphics Card(s)
    EVGA RTX 2070 (08G-P4-2171-KR)
    Sound Card
    Realtek ALC1220P / ALC S1220A
    Monitor(s) Displays
    Dell U3011 30"
    Screen Resolution
    2560 x 1600
    Hard Drives
    2x Samsung 860 EVO 500GB,
    WD 4TB Black FZBX - SATA III,
    WD 8TB Black FZBX - SATA III,
    DRW-24B1ST CD/DVD Burner
    PSU
    PC Power & Cooling 750W Quad EPS12V
    Case
    Cooler Master ATCS 840 Tower
    Cooling
    CM Hyper 212 EVO (push/pull)
    Keyboard
    Ducky DK9008 Shine II Blue LED
    Mouse
    Logitech Optical M-100
    Internet Speed
    300/300
    Browser
    Firefox (latest)
    Antivirus
    Bitdefender Internet Security
    Other Info
    Speakers: Klipsch Pro Media 2.1
  • Operating System
    Windows XP Pro 32bit w/SP3
    Computer type
    PC/Desktop
    Manufacturer/Model
    Built by Ghot® (not in use)
    CPU
    AMD Athlon 64 X2 5000+ (OC'd @ 3.2Ghz)
    Motherboard
    ASUS M2N32-SLI Deluxe Wireless Edition
    Memory
    TWIN2X2048-6400C4DHX (2 x 1GB, DDR2 800)
    Graphics card(s)
    EVGA 256-P2-N758-TR GeForce 8600GT SSC
    Sound Card
    Onboard
    Monitor(s) Displays
    ViewSonic G90FB Black 19" Professional (CRT)
    Screen Resolution
    up to 2048 x 1536
    Hard Drives
    WD 36GB 10,000rpm Raptor SATA
    Seagate 80GB 7200rpm SATA
    Lite-On LTR-52246S CD/RW
    Lite-On LH-18A1P CD/DVD Burner
    PSU
    PC Power & Cooling Silencer 750 Quad EPS12V
    Case
    Generic Beige case, 80mm fans
    Cooling
    ZALMAN 9500A 92mm CPU Cooler
    Mouse
    Logitech Optical M-BT96a
    Keyboard
    Logitech Classic Keybooard 200
    Internet Speed
    300/300
    Browser
    Firefox 3.x ??
    Antivirus
    Symantec (Norton)
    Other Info
    Still assembled, still runs. Haven't turned it on for 13 years?
There's some good news...

Attackers need Administrative access to exploit this vulnerability, according to Ghacks.net








In other words... this is pretty much like other vulnerabilities. The USER has to fall for an exploit that will give the LogoFAIL hackers, Administrative access... first. THEN... the bad guys can use the LogoFAIL vulnerability.



THIS, "need for Administrative access", was not apparent in the original ARS Technica article.

@Brink
Phew, I'll sleep easier tonight.
 

My Computers

System One System Two

  • OS
    Win 11 Pro & 🐥.
    Computer type
    Laptop
    Manufacturer/Model
    ASUS VivoBook
    CPU
    AMD Ryzen 7 3700U with Radeon Vega Mobile Gfx
    Motherboard
    ASUSTeK COMPUTER INC. X509DA (FP5)
    Memory
    12GB
    Graphics Card(s)
    RX Vega 10 Graphics
    Monitor(s) Displays
    Generic PnP Monitor (1920x1080@60Hz)
    Screen Resolution
    1920x1080@60Hz
    Hard Drives
    Samsung SSD 970 EVO Plus 2TB NVMe 1.3
    Internet Speed
    25 Mbps
    Browser
    Edge
    Antivirus
    Defender
  • Operating System
    Windows 11
    Computer type
    Laptop
    Manufacturer/Model
    ACER NITRO
    CPU
    AMD Ryzen 7 5800H / 3.2 GHz
    Motherboard
    CZ Scala_CAS (FP6)
    Memory
    32 GB DDR4 SDRAM 3200 MHz
    Graphics card(s)
    NVIDIA GeForce RTX 3060 6 GB GDDR6 SDRAM
    Sound Card
    Realtek Audio. NVIDIA High Definition Audio
    Monitor(s) Displays
    15.6" LED backlight 1920 x 1080 (Full HD) 144 Hz
    Screen Resolution
    1920 x 1080 (Full HD)
    Hard Drives
    Samsung 970 Evo Plus 2TB NVMe M.2
    PSU
    180 Watt, 19.5 V
    Mouse
    Lenovo Bluetooth
    Internet Speed
    25 Mbps
    Browser
    Edge
    Antivirus
    Defender

Latest Support Threads

Back
Top Bottom