Quoting Rich Freeman (2020-03-06 23:13:55)
> On Fri, Mar 6, 2020 at 3:55 PM Wols Lists <antli...@youngman.org.uk> wrote:
> >
> > On 06/03/20 19:39, Rich Freeman wrote:
> > >
> > > They don't detail the effort required.  If the firmware is patched it
> > > sounds like it still requires tinkering with hardware.
> >
> > By then it's TOO LATE. The firmware is signed for security, AND LOADED
> > AT BOOT. But if the boot process is compromised, the attacker simply
> > doesn't load the patched firmware.
> 
> The patched firmware executes before any software you boot, assuming
> your device was patched before the hacker got his hands on it.
> 

Well, they say that vulnerability is inside ROM code [1], which
is executed before any firmware. And because this is ROM it could
not be patched.

Ivan

[1] 
https://blog.ptsecurity.com/2020/03/intelx86-root-of-trust-loss-of-trust.html

Reply via email to