It requires the attacker to have physical access, or to have already obtained root access via some other exploit.Maybe I missed it, but what is the delivery method of this attack? USB drive, JavaScript execution by the browser, download a file, running an untrusted app, random UDP packet, etc?
I get how the exploit works, I'm just not seeing how this attack gets on to a system to begin with. If it's from simply seeing an infected image browsing the web because it gets cached, then this is a very serious exploit. It's is by downloading a file from your favorite pirate site or physically downloading an image, then this is a little be less worrying for those who know what to look for.
The blog post makes it sound more like the latter, but was curious if I missed how they delivered it.
At which point they can place the malicious image in the EFI system partition, if the UEFI is configured to load custom images from that location. Or attempt to write the image directly to the UEFI flash, if the boot logo location isn't protected by a digital signature (most or all of the UEFI should be digitally signed).
Last edited: