Quoting Rich Freeman (2020-03-06 23:13:55) > On Fri, Mar 6, 2020 at 3:55 PM Wols Lists <antli...@youngman.org.uk> wrote: > > > > On 06/03/20 19:39, Rich Freeman wrote: > > > > > > They don't detail the effort required. If the firmware is patched it > > > sounds like it still requires tinkering with hardware. > > > > By then it's TOO LATE. The firmware is signed for security, AND LOADED > > AT BOOT. But if the boot process is compromised, the attacker simply > > doesn't load the patched firmware. > > The patched firmware executes before any software you boot, assuming > your device was patched before the hacker got his hands on it. >
Well, they say that vulnerability is inside ROM code [1], which is executed before any firmware. And because this is ROM it could not be patched. Ivan [1] https://blog.ptsecurity.com/2020/03/intelx86-root-of-trust-loss-of-trust.html