/
Navigation
Chronicles
Browse all articles
Explore
Semantic exploration
Research
Entity momentum
Nexus
Correlations & relationships
Story Arc
Topic evolution
Drift Map
Semantic trajectory animation
Posts
Analysis & commentary
Pulse API
Tech news intelligence API
Browse
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
Concept Search
Semantic similarity search
High Impact Stories
Top coverage by position
Sentiment Analysis
Positive/negative coverage
Anomaly Detection
Unusual coverage patterns
Analysis
Rivalry Report
Compare two entities head-to-head
Semantic Pivots
Narrative discontinuities
Crisis Response
Event recovery patterns
Connected
Search: /
Command: ⌘K
Embeddings: large
TEXXR

Chronicles

The story behind the story

days · browse · Enter similar · o open

Binarly: UEFI Secure Boot is completely compromised on 200+ device models sold by Acer, Dell, Gigabyte, Intel, and Supermicro due to a cryptographic key leak

hundreds of devices from Dell, Supermicro and more all affected, here's what we know Adam Conway / XDA Developers : PKFail puts hundreds of computers and laptops at risk and renders Secure Boot useless on them Jowi Morales / Tom's Hardware : Secure Boot key compromised in 2022 is still in use in over 200 models — an additional 300 more use keys are marked ‘DO NOT TRUST’ Steve / SC Media : UEFI malware delivery possible with PKfail issue Jonathan Bennett / Hackaday : This Week in Security: EvilVideo, Crowdstrike, and InSecure Boot Luke Jones / WinBuzzer : Researchers Find Malware-Threatening Secure Boot Bypass in Hundreds of Devices Eduard Kovacs / SecurityWeek : PKfail Vulnerability Allows Secure Boot Bypass On Hundreds Of Computer Models Tom Warren / The Verge : Secure Boot is completely broken on many PCs. Binarly on Github : Detected Products vulnerable to PKfail Mastodon: Kee Hinckley / @nazgul@infosec.exchange : “Hey, this BIOS key says “DO NOT TRUST.  “Ship it!”  —  https://arstechnica.com/... @somebitslinks@tech.lgbt : Secure Boot fiasco: Another failure of this incredibly complicated and brittle system that turns out to provide no actual security  —  https://arstechnica.com/...  #security #badtech #bios #uefi #- Misty / @misty@digipres.club : “Keys were labeled “DO NOT TRUST.  ” Nearly 500 device models use them anyway.”  —  https://arstechnica.com/... Kenn White / @kennwhite@mastodon.social : Protip: When choosing a root-of-trust encryption key for a hardware secure enclave, maybe don't use the vendor's asymmetric key literally labeled “CN=DO NOT TRUST - Test PK”.  New scoop by @dangoodin: Secure Boot is Completely Broken on 200+ Models from 5 Big Device Makers  —  https://arstechnica.com/... X: @e__soriano : “we noticed that the private key from American Megatrends International (AMI) related to the Secure Boot “master key”, called Platform Key (PK), was publicly exposed in a data leak (...) devices corresponding to this key are still deployed in the field” https://www.binarly.io/... Plum / @plumferno : It's that time again, folks! Here's Plum with another super-comforting bit of security industry news 🥰 *cries* https://arstechnica.com/... @vermaden : Secure Boot was introduced by Microsoft not to increase security of anything - but to make installing/using free and open operating systems harder - https://arstechnica.com/... - so I could not care less if its secure or not - first thing I do on my devices is to disable this shit. Nicolas Grégoire / @agarri_fr : What a joke! 🤡 https://arstechnica.com/... @binarly_io : 🚨New! “PKFail: Untrusted Platform Keys Undermine Secure Boot on UEFI Ecosystem.” #PKfail is a supply-chain issue affecting x86/ARM devices around the globe. Blog: https://www.binarly.io/... Full report: https://22222483.fs1.hubspotusercontent - na1.net/... A free scanning tool: https://pk.fail/ [video] Nikolaj Schlej / @nikolajschlej : Don't want to be a “well, actually” guy here, but the whole UEFI SecureBoot key hierarchy is supposed to be re-generated by the local admin, as trusting whomever (be it the HW vendor with their PK or MS with their KEK) other than yourself is way too dangerous even if convenient. Forums: r/hardware : Secure Boot is completely broken on 200+ models from 5 big device makers r/technology : Secure Boot is completely broken on 200+ models from 5 big device makers |  Keys were labeled “DO NOT TRUST.”  Nearly 500 device models use them anyway Lobsters : Secure Boot is completely broken on 200+ models from 5 big device makers Ars OpenForum : Secure Boot is completely broken on 200+ models from 5 big device makers

Ars Technica Dan Goodin

Discussion

  • @kennwhite@mastodon.social Kenn White on mastodon
    Protip: When choosing a root-of-trust encryption key for a hardware secure enclave, maybe don't use the vendor's asymmetric key literally labeled “CN=DO NOT TRUST - Test PK”.  New scoop by @dangoodin: Secure Boot is Completely Broken on 200+ Models from 5 Big Device Makers  —  ht…
  • @e__soriano @e__soriano on x
    “we noticed that the private key from American Megatrends International (AMI) related to the Secure Boot “master key”, called Platform Key (PK), was publicly exposed in a data leak (...) devices corresponding to this key are still deployed in the field” https://www.binarly.io/...
  • @plumferno Plum on x
    It's that time again, folks! Here's Plum with another super-comforting bit of security industry news 🥰 *cries* https://arstechnica.com/...
  • @vermaden @vermaden on x
    Secure Boot was introduced by Microsoft not to increase security of anything - but to make installing/using free and open operating systems harder - https://arstechnica.com/... - so I could not care less if its secure or not - first thing I do on my devices is to disable this shi…
  • @agarri_fr Nicolas Grégoire on x
    What a joke! 🤡 https://arstechnica.com/...
  • @binarly_io @binarly_io on x
    🚨New! “PKFail: Untrusted Platform Keys Undermine Secure Boot on UEFI Ecosystem.” #PKfail is a supply-chain issue affecting x86/ARM devices around the globe. Blog: https://www.binarly.io/... Full report: https://22222483.fs1.hubspotusercontent - na1.net/... A free scanning tool: h…
  • @nikolajschlej Nikolaj Schlej on x
    Don't want to be a “well, actually” guy here, but the whole UEFI SecureBoot key hierarchy is supposed to be re-generated by the local admin, as trusting whomever (be it the HW vendor with their PK or MS with their KEK) other than yourself is way too dangerous even if convenient.
  • r/hardware r on reddit
    Secure Boot is completely broken on 200+ models from 5 big device makers
  • r/technology r on reddit
    Secure Boot is completely broken on 200+ models from 5 big device makers |  Keys were labeled “DO NOT TRUST.”  Nearly 500 device models use them anyway