Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » PixieFail UEFI flaw exposes millions of computers to RCE, DoS and data theft
    Cyber Security

    PixieFail UEFI flaw exposes millions of computers to RCE, DoS and data theft

    techempireBy techempire3 Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    ReportJanuary 18, 2024Editorial DepartmentFirmware Security/Vulnerabilities

    PixieFail UEFI flaw

    Multiple security vulnerabilities have been disclosed in the TCP/IP network protocol stack of the open source reference implementation of the Unified Extensible Firmware Interface (UEFI) specification, which is widely used in modern computers.

    collectively referred to as Elf failed According to Quarkslab’s report, these nine issues exist in the TianoCore EFI Development Kit II (EDK II) and can be exploited to achieve remote code execution, denial of service (DoS), DNS cache poisoning, and sensitive information leakage.

    AMI, Intel, Insyde and Phoenix Technologies’ UEFI firmware (which boots the operating system) is affected by these flaws.

    EDK II integrates its own TCP/IP stack (called NetworkPkg) to enable networking capabilities during the initial preboot execution environment (PXE, pronounced “pixie”) phase, allowing for the absence of a running operating system. Perform administrative tasks.

    Internet security

    In other words, it is a client-server interface that boots a device from its network interface card (NIC) and allows administrators to remotely configure and boot networked computers that do not yet have an operating system loaded.

    The PXE code is included as part of the UEFI firmware on the motherboard or in the NIC firmware read-only memory (ROM).

    PixieFail UEFI flaw

    The problems discovered by Quarkslab in EDKII’s NetworkPkg include overflow errors, out-of-bounds reads, infinite loops, and the use of weak pseudo-random number generators (PRNG). These problems can lead to DNS and DHCP poisoning attacks, information leakage, denial of service, IPv4 and data insertion attacks at the IPv6 layer.

    The list of defects is as follows –

    • CVE-2023-45229 (CVSS Score: 6.5) – Integer underflow when processing IA_NA/IA_TA options in DHCPv6 Advertisement messages
    • CVE-2023-45230 (CVSS score: 8.3) – Buffer overflow in DHCPv6 client via long server ID option
    • CVE-2023-45231 (CVSS Score: 6.5) – Out-of-bounds read when processing ND redirect message with truncation option
    • CVE-2023-45232 (CVSS score: 7.5) – Infinite loop when parsing unknown options in Destination Options header
    • CVE-2023-45233 (CVSS score: 7.5) – Infinite loop when parsing PadN options in Destination Options header
    • CVE-2023-45234 (CVSS score: 8.3) – Buffer overflow in handling DNS server options in DHCPv6 advertisement messages
    • CVE-2023-45235 (CVSS score: 8.3) – Buffer overflow when processing server ID option from DHCPv6 proxy advertisement message
    • CVE-2023-45236 (CVSS score: 5.8) – Predictable TCP initial sequence number
    • CVE-2023-45237 (CVSS score: 5.3) – Uses a weak pseudo-random number generator
    Internet security

    “The impact and exploitability of these vulnerabilities depend on the specific firmware version and default PXE boot configuration,” the CERT Coordination Center (CERT/CC) said in an advisory.

    “An attacker within the local network (and in some cases, a remote attacker) can exploit these vulnerabilities to execute remote code, launch a DoS attack, poison the DNS cache, or extract sensitive information.”

    Did you find this article interesting?follow us Twitter  and LinkedIn to read more exclusive content from us.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Ongoing campaign bombards businesses with spam emails and phone calls

    6 common mistakes organizations make when deploying advanced authentication

    New Chrome zero-day vulnerability CVE-2024-4761 is being actively exploited

    Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities

    Dutch court sentences Tornado Cash co-founder to 5 years in prison for money laundering

    Migrate from VMware vSphere to Microsoft Azure

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Gateway Studios High-Tech Recording Studio To Open In Chesterfield, Missouri

    Edufox

    Emerging Academic Education Platforms – Sponsored By Edufox

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.