Article Details
Scrape Timestamp (UTC): 2024-01-18 09:27:12.411
Source: https://thehackernews.com/2024/01/pixiefail-uefi-flaws-expose-millions-of.html
Original Article Text
Click to Toggle View
PixieFail UEFI Flaws Expose Millions of Computers to RCE, DoS, and Data Theft. Multiple security vulnerabilities have been disclosed in the TCP/IP network protocol stack of an open-source reference implementation of the Unified Extensible Firmware Interface (UEFI) specification used widely in modern computers. Collectively dubbed PixieFail by Quarkslab, the nine issues reside in the TianoCore EFI Development Kit II (EDK II) and could be exploited to achieve remote code execution, denial-of-service (DoS), DNS cache poisoning, and leakage of sensitive information. UEFI firmware – which is responsible for booting the operating system – from AMI, Intel, Insyde, and Phoenix Technologies are impacted by the shortcomings. EDK II incorporates its own TCP/IP stack called NetworkPkg to enable network functionalities available during the initial Preboot eXecution Environment (PXE, pronounced "pixie") stage, which allows for management tasks in the absence of a running operating system. In other words, it is a client-server interface to boot a device from its network interface card (NIC) and allows networked computers that are not yet loaded with an operating system to be configured and booted remotely by an administrator. The code to PXE is included as part of the UEFI firmware on the motherboard or within the NIC firmware read-only memory (ROM). The issues identified by Quarkslab within the EDKII's NetworkPkg encompass overflow bugs, out-of-bounds read, infinite loops, and the use of weak pseudorandom number generator (PRNG) that result in DNS and DHCP poisoning attacks, information leakage, denial of service, and data insertion attacks at the IPv4 and IPv6 layer. The list of flaws is as follows - "The impact and exploitability of these vulnerabilities depend on the specific firmware build and the default PXE boot configuration," the CERT Coordination Center (CERT/CC) said in an advisory. "An attacker within the local network (and, in certain scenarios remotely) could exploit these weaknesses to execute remote code, initiate DoS attacks, conduct DNS cache poisoning, or extract sensitive information." Report: Unveiling the Threat of Malicious Browser Extensions Download the Report to learn the Risks of Malicious Extensions and How to Mitigate Them. SaaS Security Masterclass: Insights from 493 Companies Watch this webinar to discover Critical SaaS Security Do's and Don'ts based on a study of 493 companies, offering real-world comparisons and benchmarks.
Daily Brief Summary
Security flaws branded as PixieFail found in the open-source reference implementation of the UEFI specification widely used in computers.
Nine vulnerabilities in TianoCore EFI Development Kit II (EDK II) could lead to remote code execution, denial-of-service attacks, DNS cache poisoning, and data leaks.
UEFI firmware from major manufacturers like AMI, Intel, Insyde, and Phoenix Technologies could be compromised due to these issues.
The flaws exist in the EDK II's NetworkPkg, affecting both IPv4 and IPv6, enabling potential attacks even before the operating system boots.
Quarkslab identified security weaknesses spanning from overflow bugs to weak pseudorandom number generation that could facilitate information theft and network exploits.
The CERT Coordination Center has issued advisories regarding these vulnerabilities, stating that local or remote attackers could exploit them under certain conditions.
Implications for the security community include the need for patching and updating firmware to prevent exploitation of these vulnerabilities.