Researchers have discovered malicious code circulating in the wild that hijacks the earliest stage boot process of Linux devices by exploiting a year-old firmware vulnerability when it remains unpatched on affected models.

The critical vulnerability is one of a constellation of exploitable flaws discovered last year and given the name LogoFAIL. These exploits are able to override an industry-standard defense known as Secure Boot and execute malicious firmware early in the boot process. Until now, there were no public indications that LogoFAIL exploits were circulating in the wild.

The discovery of code downloaded from an Internet-connected web server changes all that. While there are no indications the public exploit is actively being used, it is reliable and polished enough to be production-ready and could pose a threat in the real world in the coming weeks or months. Both the LogoFAIL vulnerabilities and the exploit found on-line were discovered by Binarly, a firm that helps customers identify and secure vulnerable firmware.

  • davidgro@lemmy.world
    link
    fedilink
    English
    arrow-up
    26
    ·
    27 days ago

    A famous one of these was the headline

    Galaxy Nexus: Android Ice Cream Sandwich Guinea Pig

      • GeneralVincent@lemmy.world
        link
        fedilink
        English
        arrow-up
        7
        ·
        27 days ago

        Pretty sure it means

        Galaxy Nexus (the smartphone): Android (OS) Ice Cream Sandwich (OS Version) Guinea Pig (Test Subject)

        (So the new Android OS version, Ice Cream Sandwich, is being tested on the Galaxy Nexus phone)

      • sugar_in_your_tea@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        3
        ·
        edit-2
        27 days ago

        Galaxy Nexus

        Android phone by Google released ~15 years ago.

        Android Ice Cream Sandwich

        Android 4.0

        Guinea Pig

        First to try something.

        Make sense?