Lenovo driver goof poses safety danger for customers of 25 pocket book fashions

on

|

views

and

comments


Lenovo driver goof poses security risk for users of 25 notebook models

Getty Pictures

Greater than two dozen Lenovo pocket book fashions are weak to malicious hacks that disable the UEFI safe boot course of after which run unsigned UEFI apps or load bootloaders that completely backdoor a tool, researchers warned on Wednesday.

On the similar time that researchers from safety agency ESET disclosed the vulnerabilities, the pocket book maker launched safety updates for 25 fashions, together with ThinkPads, Yoga Slims, and IdeaPads. Vulnerabilities that undermine the UEFI safe boot might be severe as a result of they make it attainable for attackers to put in malicious firmware that survives a number of working system reinstallations.

Not widespread, even uncommon

Brief for Unified Extensible Firmware Interface, UEFI is the software program that bridges a pc’s gadget firmware with its working system. As the primary piece of code to run when nearly any fashionable machine is turned on, it’s the primary hyperlink within the safety chain. As a result of the UEFI resides in a flash chip on the motherboard, infections are troublesome to detect and take away. Typical measures comparable to wiping the onerous drive and reinstalling the OS don’t have any significant affect as a result of the UEFI an infection will merely reinfect the pc afterward.

ESET stated the vulnerabilities—tracked as CVE-2022-3430, CVE-2022-3431, and CVE-2022-3432—“enable disabling UEFI Safe Boot or restoring manufacturing facility default Safe Boot databases (incl. dbx): all merely from an OS.” Safe boot makes use of databases to permit and deny mechanisms. The DBX database, particularly, shops cryptographic hashes of denied keys. Disabling or restoring default values within the databases makes it attainable for an attacker to take away restrictions that may usually be in place.

“Altering issues in firmware from the OS isn’t widespread, even uncommon,” a researcher specializing in firmware safety, who most well-liked to not be named, stated in an interview. “Most people imply that to alter settings in firmware or in BIOS you’ll want to have bodily entry to smash the DEL button at boot to enter the setup and do issues there. When you are able to do a few of the issues from the OS, that is form of a giant deal.”

Disabling the UEFI Safe Boot frees attackers to execute malicious UEFI apps, one thing that’s usually not attainable as a result of safe boot requires UEFI apps to be cryptographically signed. Restoring the factory-default DBX, in the meantime, permits attackers to load weak bootloaders. In August, researchers from safety agency Eclypsium recognized three outstanding software program drivers that could possibly be used to bypass safe boot when an attacker has elevated privileges, which means administrator on Home windows or root on Linux.

The vulnerabilities might be exploited by tampering with variables in NVRAM, the non-volatile RAM that shops varied boot choices. The vulnerabilities are the results of Lenovo mistakenly delivery Notebooks with drivers that had been meant to be used solely through the manufacturing course of. The vulnerabilities are:

  • CVE-2022-3430: A possible vulnerability within the WMI Setup driver on some shopper Lenovo Pocket book gadgets might enable an attacker with elevated privileges to change safe boot settings by altering an NVRAM variable.
  • CVE-2022-3431: A possible vulnerability in a driver used through the manufacturing course of on some shopper Lenovo Pocket book gadgets that was mistakenly not deactivated might enable an attacker with elevated privileges to change safe boot setting by altering an NVRAM variable.
  • CVE-2022-3432: A possible vulnerability in a driver used throughout manufacturing course of on the Ideapad Y700-14ISK that was mistakenly not deactivated might enable an attacker with elevated privileges to change safe boot setting by adjusting an NVRAM variable.

Lenovo is patching solely the primary two. CVE-2022-3432 won’t be patched as a result of the corporate now not helps the Ideapad Y700-14ISK, the end-of-life pocket book mannequin that’s affected. Individuals utilizing any of the opposite weak fashions ought to set up patches as quickly as sensible.

Go to dialogue…



Share this
Tags

Must-read

Nvidia CEO reveals new ‘reasoning’ AI tech for self-driving vehicles | Nvidia

The billionaire boss of the chipmaker Nvidia, Jensen Huang, has unveiled new AI know-how that he says will assist self-driving vehicles assume like...

Tesla publishes analyst forecasts suggesting gross sales set to fall | Tesla

Tesla has taken the weird step of publishing gross sales forecasts that recommend 2025 deliveries might be decrease than anticipated and future years’...

5 tech tendencies we’ll be watching in 2026 | Expertise

Hi there, and welcome to TechScape. I’m your host, Blake Montgomery, wishing you a cheerful New Yr’s Eve full of cheer, champagne and...

Recent articles

More like this

LEAVE A REPLY

Please enter your comment!
Please enter your name here