Thursday, July 4, 2024

PixieFail UEFI Flaws Expose Tens of millions of Computer systems to RCE, DoS, and Information Theft

Jan 18, 2024NewsroomFirmware Safety / Vulnerability

PixieFail UEFI Flaws

A number of safety vulnerabilities have been disclosed within the TCP/IP community protocol stack of an open-source reference implementation of the Unified Extensible Firmware Interface (UEFI) specification used broadly in trendy computer systems.

Collectively dubbed PixieFail by Quarkslab, the 9 points reside within the TianoCore EFI Growth Package II (EDK II) and could possibly be exploited to realize distant code execution, denial-of-service (DoS), DNS cache poisoning, and leakage of delicate data.

UEFI firmware – which is accountable for booting the working system – from AMI, Intel, Insyde, and Phoenix Applied sciences are impacted by the shortcomings.

EDK II incorporates its personal TCP/IP stack referred to as NetworkPkg to allow community functionalities accessible through the preliminary Preboot eXecution Setting (PXE, pronounced “pixie”) stage, which permits for administration duties within the absence of a working working system.

Cybersecurity

In different phrases, it’s a client-server interface to boot a tool from its community interface card (NIC) and permits networked computer systems that aren’t but loaded with an working system to be configured and booted remotely by an administrator.

The code to PXE is included as a part of the UEFI firmware on the motherboard or inside the NIC firmware read-only reminiscence (ROM).

PixieFail UEFI Flaws

The points recognized by Quarkslab inside the EDKII’s NetworkPkg embody overflow bugs, out-of-bounds learn, infinite loops, and the usage of weak pseudorandom quantity generator (PRNG) that end in DNS and DHCP poisoning assaults, data leakage, denial of service, and knowledge insertion assaults on the IPv4 and IPv6 layer.

The record of flaws is as follows –

  • CVE-2023-45229 (CVSS rating: 6.5) – Integer underflow when processing IA_NA/IA_TA choices in a DHCPv6 Promote message
  • CVE-2023-45230 (CVSS rating: 8.3) – Buffer overflow within the DHCPv6 consumer through a protracted Server ID choice
  • CVE-2023-45231 (CVSS rating: 6.5) – Out-of-bounds learn when dealing with a ND Redirect message with truncated choices
  • CVE-2023-45232 (CVSS rating: 7.5) – Infinite loop when parsing unknown choices within the Vacation spot Choices header
  • CVE-2023-45233 (CVSS rating: 7.5) – Infinite loop when parsing a PadN choice within the Vacation spot Choices header
  • CVE-2023-45234 (CVSS rating: 8.3) – Buffer overflow when processing DNS Servers choice in a DHCPv6 Promote message
  • CVE-2023-45235 (CVSS rating: 8.3) – Buffer overflow when dealing with Server ID choice from a DHCPv6 proxy Promote message
  • CVE-2023-45236 (CVSS rating: 5.8) – Predictable TCP Preliminary Sequence Numbers
  • CVE-2023-45237 (CVSS rating: 5.3) – Use of a weak pseudorandom quantity generator
Cybersecurity

“The influence and exploitability of those vulnerabilities rely on the particular firmware construct and the default PXE boot configuration,” the CERT Coordination Heart (CERT/CC) mentioned in an advisory.

“An attacker inside the native community (and, in sure situations remotely) may exploit these weaknesses to execute distant code, provoke DoS assaults, conduct DNS cache poisoning, or extract delicate data.”

Discovered this text attention-grabbing? Comply with us on Twitter and LinkedIn to learn extra unique content material we publish.



Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles