Fortunately, UEFI security has advanced in many different directions, too. UEFI’s place in the world has grown rapidly in the last few years, from the desktop/laptop and server market to the Internet of Things (IoT), mobile, automotive, drones, etc. Hopefully, their effort will lead to more secure firmware. Recently, Intel has announced a new bug bounty program, which also includes the firmware. On the other hand, more and more information about UEFI implants has become available, for example, HackingTeam and state-sponsored implants.īut most often, this information becomes public because of leaks, primarily because no detection tools are available and UEFI implants are typically used for targeted attacks. On one hand, there has been an increase in activity from the security research community leading to increase in reported UEFI firmware vulnerabilities (Year-over-Year) as the UEFI ecosystem became more and more complex.
The state of UEFI firmware security has become more serious in the last few years.
The situation is serious but, with the right tools and knowledge, we can prevail. This talk raises awareness of these security challenges for hardware vendors, BIOS-level security researchers and defenders, and sophisticated stakeholders who want to know the current state of UEFI exposure and threats. In our upcoming Black Hat Vegas talk, we will summarize our research about the UEFI firmware protections and our newly-discovered security problems.