• Welcome to TechPowerUp Forums, Guest! Please check out our forum guidelines for info related to our community.

Vulnerability due to default key makes Secure Boot unsafe on hundreds of PC types

Joined
Jan 5, 2006
Messages
18,585 (2.71/day)
System Name AlderLake
Processor Intel i7 12700K P-Cores @ 5Ghz
Motherboard Gigabyte Z690 Aorus Master
Cooling Noctua NH-U12A 2 fans + Thermal Grizzly Kryonaut Extreme + 5 case fans
Memory 32GB DDR5 Corsair Dominator Platinum RGB 6000MT/s CL36
Video Card(s) MSI RTX 2070 Super Gaming X Trio
Storage Samsung 980 Pro 1TB + 970 Evo 500GB + 850 Pro 512GB + 860 Evo 1TB x2
Display(s) 23.8" Dell S2417DG 165Hz G-Sync 1440p
Case Be quiet! Silent Base 600 - Window
Audio Device(s) Panasonic SA-PMX94 / Realtek onboard + B&O speaker system / Harman Kardon Go + Play / Logitech G533
Power Supply Seasonic Focus Plus Gold 750W
Mouse Logitech MX Anywhere 2 Laser wireless
Keyboard RAPOO E9270P Black 5GHz wireless
Software Windows 11
Benchmark Scores Cinebench R23 (Single Core) 1936 @ stock Cinebench R23 (Multi Core) 23006 @ stock
Hundreds of laptop models from different brands use an unsafe Secure Boot key.
As a result, it is possible to install UEFI malware such as bootkits or to disable Secure Boot completely on at least 900 devices from well-known brands such as Acer and Dell.

Researchers from Binarly draw this conclusion in a study they call PKfail.

Systems affected:

The researchers looked at an internal dataset with UEFI firmware images and scanned them for the use of the Platform Key in question.
According to them, there are more than 900 laptops and systems from Acer, Dell, Gigabyte, HP and Lenovo that are vulnerable to PKfail.
This makes it possible to completely bypass Secure Boot and install code on a system, such as a UEFI rootkit.

The researchers say that the affected devices use a Platform Key that is no longer secure. Such a Platform Key is a kind of master key for Secure Boot devices.
The researchers found a git repository online that contained that master key. That repo was updated in December 2022, but has since been taken offline.
It’s not known when that happened or who had access to it in the meantime, but the researchers say all devices using that master key are vulnerable.
The git repo itself was encrypted, but the password was only four characters long, making it relatively easy to crack.

In practice, this is quite a lot of work; an attacker still has to manipulate the Key Exchange Key, Signature and Forbidden Signature databases on a system.
The researchers have also released a proof-of-concept. This shows how the bug can be exploited on both a Windows and Ubuntu PC.

 
Last edited:

eidairaman1

The Exiled Airman
Joined
Jul 2, 2007
Messages
41,500 (6.58/day)
Location
Republic of Texas (True Patriot)
System Name PCGOD
Processor AMD FX 8350@ 5.0GHz
Motherboard Asus TUF 990FX Sabertooth R2 2901 Bios
Cooling Scythe Ashura, 2×BitFenix 230mm Spectre Pro LED (Blue,Green), 2x BitFenix 140mm Spectre Pro LED
Memory 16 GB Gskill Ripjaws X 2133 (2400 OC, 10-10-12-20-20, 1T, 1.65V)
Video Card(s) AMD Radeon 290 Sapphire Vapor-X
Storage Samsung 840 Pro 256GB, WD Velociraptor 1TB
Display(s) NEC Multisync LCD 1700V (Display Port Adapter)
Case AeroCool Xpredator Evil Blue Edition
Audio Device(s) Creative Labs Sound Blaster ZxR
Power Supply Seasonic 1250 XM2 Series (XP3)
Mouse Roccat Kone XTD
Keyboard Roccat Ryos MK Pro
Software Windows 7 Pro 64
David Plummer's thoughts on it

 
Joined
Feb 1, 2019
Messages
3,388 (1.63/day)
Location
UK, Midlands
System Name Main PC
Processor 13700k
Motherboard Asrock Z690 Steel Legend D4 - Bios 13.02
Cooling Noctua NH-D15S
Memory 32 Gig 3200CL14
Video Card(s) 4080 RTX SUPER FE 16G
Storage 1TB 980 PRO, 2TB SN850X, 2TB DC P4600, 1TB 860 EVO, 2x 3TB WD Red, 2x 4TB WD Red
Display(s) LG 27GL850
Case Fractal Define R4
Audio Device(s) Soundblaster AE-9
Power Supply Antec HCG 750 Gold
Software Windows 10 21H2 LTSC
David Plummer's thoughts on it

Ouch, shame most of the video is explaining how secure boot works, its why I usually prefer walls of text.

In short a testing key that was only ever intended for internal use was shipped publically.
 
Joined
Mar 18, 2023
Messages
795 (1.40/day)
System Name Never trust a socket with less than 2000 pins
In short a testing key that was only ever intended for internal use was shipped publically.

There are two issues they found:

1) a key was left enabled where the private part was accidentally posted on github. This affects about 200 models and is a super screwup

2) as you say, a testing key was shipped
 
Joined
Jul 30, 2019
Messages
3,106 (1.64/day)
System Name Still not a thread ripper but pretty good.
Processor Ryzen 9 7950x, Thermal Grizzly AM5 Offset Mounting Kit, Thermal Grizzly Extreme Paste
Motherboard ASRock B650 LiveMixer (BIOS/UEFI version P3.08, AGESA 1.2.0.2)
Cooling EK-Quantum Velocity, EK-Quantum Reflection PC-O11, D5 PWM, EK-CoolStream PE 360, XSPC TX360
Memory Micron DDR4-5600 ECC Unbuffered Memory (2 sticks, 64GB, MTC20C2085S1EC56BD1) + JONSBO NF-1
Video Card(s) XFX Radeon RX 5700 & EK-Quantum Vector Radeon RX 5700 +XT & Backplate
Storage Samsung 4TB 980 PRO, 2 x Optane 905p 1.5TB (striped), AMD Radeon RAMDisk
Display(s) 2 x 4K LG 27UL600-W (and HUANUO Dual Monitor Mount)
Case Lian Li PC-O11 Dynamic Black (original model)
Audio Device(s) Corsair Commander Pro for Fans, RGB, & Temp Sensors (x4)
Power Supply Corsair RM750x
Mouse Logitech M575
Keyboard Corsair Strafe RGB MK.2
Software Windows 10 Professional (64bit)
Benchmark Scores RIP Ryzen 9 5950x, ASRock X570 Taichi (v1.06), 128GB Micron DDR4-3200 ECC UDIMM (18ASF4G72AZ-3G2F1)
Joined
Aug 25, 2023
Messages
298 (0.73/day)
System Name Personal computers
Processor Ryzen 7000, 8000 & 9000 series
Motherboard X670E & B650 boards
Cooling Deep Cool, Cooler Master, Thermal take & Stock air coolers
Memory G.Skill Flare X5, Corsair Vengeance RGB, Team T-Create & Adata
Video Card(s) Asus TUF gaming RX 7900 XTX OC edition / iGPUs
Storage 1 + 2TB T-Force Cardea A440 pro / 2 x Kingston KC3000 1TB
Display(s) 34 " / 32" / 27" LCDs
Case MSI MPG Sekira 100R / Silverstone Redline mATX / Antec C8
Audio Device(s) Asus Xonar AE 7.1 + Audio Technica -AD500X / Onboard + Creative 2.1 soundbar
Power Supply Corsair RM1000x V2 / Corsair RM750x V2 / Thermaltake 650W GF1
Mouse MSI Clutch GM20 Elite / CM Reaper /
Keyboard Logitech G512 Carbon / MSI G30 Vigor / Ttesports Challenger Duo
Insecure secure boot! :rolleyes:
 

eidairaman1

The Exiled Airman
Joined
Jul 2, 2007
Messages
41,500 (6.58/day)
Location
Republic of Texas (True Patriot)
System Name PCGOD
Processor AMD FX 8350@ 5.0GHz
Motherboard Asus TUF 990FX Sabertooth R2 2901 Bios
Cooling Scythe Ashura, 2×BitFenix 230mm Spectre Pro LED (Blue,Green), 2x BitFenix 140mm Spectre Pro LED
Memory 16 GB Gskill Ripjaws X 2133 (2400 OC, 10-10-12-20-20, 1T, 1.65V)
Video Card(s) AMD Radeon 290 Sapphire Vapor-X
Storage Samsung 840 Pro 256GB, WD Velociraptor 1TB
Display(s) NEC Multisync LCD 1700V (Display Port Adapter)
Case AeroCool Xpredator Evil Blue Edition
Audio Device(s) Creative Labs Sound Blaster ZxR
Power Supply Seasonic 1250 XM2 Series (XP3)
Mouse Roccat Kone XTD
Keyboard Roccat Ryos MK Pro
Software Windows 7 Pro 64
Ouch, shame most of the video is explaining how secure boot works, its why I usually prefer walls of text.

In short a testing key that was only ever intended for internal use was shipped publically.
He is a Retired MS Developer from the beginning
 
Joined
Nov 13, 2007
Messages
10,590 (1.72/day)
Location
Austin Texas
System Name Planet Espresso
Processor 13700KF @ 5.4GHZ UV - 220W cap
Motherboard MSI 690-I PRO
Cooling Thermalright Phantom Spirit EVO
Memory 48 GB DDR5 7600 MHZ CL36
Video Card(s) RTX 4090 FE
Storage 2TB WD SN850, 4TB WD SN850X
Display(s) Alienware 32" 4k 240hz OLED
Case Jonsbo Z20
Audio Device(s) Yes
Power Supply Corsair SF750
Mouse Xlite V2
Keyboard 65% HE Keyboard
Software Windows 11
Benchmark Scores They're pretty good, nothing crazy.
In practice, this is quite a lot of work; an attacker still has to manipulate the Key Exchange Key, Signature and Forbidden Signature databases on a system.
The researchers have also released a proof-of-concept. This shows how the bug can be exploited on both a Windows and Ubuntu PC.

This reminds me a bit of the spectre/meltdown where the code had to be locally executed and running unnoticed on the machine, and then would access certain speculative execution registers on the processor (in tiny fragments) and then could send the data back to the attacker to have him piece it together and POTENTIALLY find a password or something in there...

1722055645422.png


Here you go, bro... good luck.

I feel like this is the least of your problems if an attacker is already on the machine with a su console or an admin powershell
 
Last edited:

Frick

Fishfaced Nincompoop
Joined
Feb 27, 2006
Messages
19,298 (2.84/day)
Location
Piteå
System Name White DJ in Detroit
Processor Ryzen 5 5600
Motherboard Asrock B450M-HDV
Cooling Be Quiet! Pure Rock 2
Memory 2 x 16GB Kingston Fury 3400mhz
Video Card(s) XFX 6950XT Speedster MERC 319
Storage Kingston A400 240GB | WD Black SN750 2TB |WD Blue 1TB x 2 | Toshiba P300 2TB | Seagate Expansion 8TB
Display(s) Samsung U32J590U 4K + BenQ GL2450HT 1080p
Case Fractal Design Define R4
Audio Device(s) Line6 UX1 + some headphones, Nektar SE61 keyboard
Power Supply Corsair RM850x v3
Mouse Logitech G602
Keyboard Cherry MX Board 1.0 TKL Brown
Software Windows 10 Pro
Benchmark Scores Rimworld 4K ready!
Powershell command to test on your own system:
Code:
[System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI PK).bytes) -match "DO NOT TRUST|DO NOT SHIP"
 
Joined
Feb 1, 2019
Messages
3,388 (1.63/day)
Location
UK, Midlands
System Name Main PC
Processor 13700k
Motherboard Asrock Z690 Steel Legend D4 - Bios 13.02
Cooling Noctua NH-D15S
Memory 32 Gig 3200CL14
Video Card(s) 4080 RTX SUPER FE 16G
Storage 1TB 980 PRO, 2TB SN850X, 2TB DC P4600, 1TB 860 EVO, 2x 3TB WD Red, 2x 4TB WD Red
Display(s) LG 27GL850
Case Fractal Define R4
Audio Device(s) Soundblaster AE-9
Power Supply Antec HCG 750 Gold
Software Windows 10 21H2 LTSC
This reminds me a bit of the spectre/meltdown where the code had to be locally executed and running unnoticed on the machine, and then would access certain speculative execution registers on the processor (in tiny fragments) and then could send the data back to the attacker to have him piece it together and POTENTIALLY find a password or something in there...

View attachment 356525

Here you go, bro... good luck.

I feel like this is the least of your problems if an attacker is already on the machine with a su console or an admin powershell
I agree for the most part, if the machine is already owned, then further exploitation via spectre etc. is moot.

Although a bios based rootkit is different in that even reinstalling the OS wouldnt clean out the system. Presumably one would have to wipe the keys in the bios (in case a new one was added via the malware author), and then if the bios has such a feature wipe all of the writable EFI area.

Thinking about this a little more though, affected systems are compromised at this point regardless of any bios cleaning, as someone decided it was a good idea to not let people view/delete the existing keys, so you then just at the mercy of the manufacturer to provide a bios update, and given the replies from Lenova and co, I dont think one is forthcoming. I do think the practical use case for an actual ongoing bios compromise is limited though, this problem means the bootloader could be replaced for the existing operating system, and from there it can progress, but a full clean reinstall would then reset that bootloader, and the original compromise that allowed them to replace the bootloader in the first place.

But I agree with your basic point, once you are owned, you are owned, regardless of secondary infections.
 
Joined
Nov 13, 2007
Messages
10,590 (1.72/day)
Location
Austin Texas
System Name Planet Espresso
Processor 13700KF @ 5.4GHZ UV - 220W cap
Motherboard MSI 690-I PRO
Cooling Thermalright Phantom Spirit EVO
Memory 48 GB DDR5 7600 MHZ CL36
Video Card(s) RTX 4090 FE
Storage 2TB WD SN850, 4TB WD SN850X
Display(s) Alienware 32" 4k 240hz OLED
Case Jonsbo Z20
Audio Device(s) Yes
Power Supply Corsair SF750
Mouse Xlite V2
Keyboard 65% HE Keyboard
Software Windows 11
Benchmark Scores They're pretty good, nothing crazy.
I agree for the most part, if the machine is already owned, then further exploitation via spectre etc. is moot.

Although a bios based rootkit is different in that even reinstalling the OS wouldnt clean out the system. Presumably one would have to wipe the keys in the bios (in case a new one was added via the malware author), and then if the bios has such a feature wipe all of the writable EFI area.

Thinking about this a little more though, affected systems are compromised at this point regardless of any bios cleaning, as someone decided it was a good idea to not let people view/delete the existing keys, so you then just at the mercy of the manufacturer to provide a bios update, and given the replies from Lenova and co, I dont think one is forthcoming. I do think the practical use case for an actual ongoing bios compromise is limited though, this problem means the bootloader could be replaced for the existing operating system, and from there it can progress, but a full clean reinstall would then reset that bootloader, and the original compromise that allowed them to replace the bootloader in the first place.

But I agree with your basic point, once you are owned, you are owned, regardless of secondary infections.
I just think that these researchers run the "boy who cried wolf" risk by overplaying some of these more obscure vulnerabilities. It would help if they gave a "real world risk rating" or some other practical guage of the probability of that this exploit will be used. Maybe a risk by consumer type gauge.
 
Last edited:
Joined
Mar 18, 2023
Messages
795 (1.40/day)
System Name Never trust a socket with less than 2000 pins
Although a bios based rootkit is different in that even reinstalling the OS wouldnt clean out the system. Presumably one would have to wipe the keys in the bios (in case a new one was added via the malware author), and then if the bios has such a feature wipe all of the writable EFI area.

Thinking about this a little more though, affected systems are compromised at this point regardless of any bios cleaning, as someone decided it was a good idea to not let people view/delete the existing keys, so you then just at the mercy of the manufacturer to provide a bios update, and given the replies from Lenova and co, I dont think one is forthcoming. I do think the practical use case for an actual ongoing bios compromise is limited though, this problem means the bootloader could be replaced for the existing operating system, and from there it can progress, but a full clean reinstall would then reset that bootloader, and the original compromise that allowed them to replace the bootloader in the first place.

This was the topic of a Qubes OS talk at a recent chaos communication congress. Can't find the link right now.

Basically a computer must not be allowed to have any writeable memory that cannot be removed and mounted in very raw mode on a different computer. The BIOS is the obvious example, but it also applies to all kinds of extension cars, especially wifi. Only that will give you the transparency you need.

It goes without saying that security features like secure boot in the hands of vendors that behave like amateurs is unacceptable, too. The whole shebang needs to be open source.
 
Joined
Oct 22, 2014
Messages
13,905 (3.82/day)
Location
Sunshine Coast
System Name Lenovo ThinkCentre
Processor AMD 5650GE
Motherboard Lenovo
Memory 32 GB DDR4
Display(s) AOC 24" Freesync 1m.s. 75Hz
Mouse Lenovo
Keyboard Lenovo
Software W11 Pro 64 bit
It's basically a non issue as the "hacker" must have direct access to the device.
Then you have bigger issues.
 
Joined
Nov 7, 2017
Messages
1,800 (0.71/day)
Location
Ibiza, Spain.
System Name Main
Processor R7 5950x
Motherboard MSI x570S Unify-X Max
Cooling converted Eisbär 280, two F14 + three F12S intake, two P14S + two P14 + two F14 as exhaust
Memory 16 GB Corsair LPX bdie @3600/16 1.35v
Video Card(s) GB 2080S WaterForce WB
Storage six M.2 pcie gen 4
Display(s) Sony 50X90J
Case Tt Level 20 HT
Audio Device(s) Asus Xonar AE, modded Sennheiser HD 558, Klipsch 2.1 THX
Power Supply Corsair RMx 750w
Mouse Logitech G903
Keyboard GSKILL Ripjaws
VR HMD NA
Software win 10 pro x64
Benchmark Scores TimeSpy score Fire Strike Ultra SuperPosition CB20
@phanbuey
@Caring1
until its someone working at the location (gov/mil etc; no suspicion about being around), going rogue.

not everything is about a real world use on a single end user pc, and for certain things even a "less than 1%/not likely.." isnt good enough (to not worry about it)..
 

Ruru

S.T.A.R.S.
Joined
Dec 16, 2012
Messages
12,357 (2.87/day)
Location
Jyväskylä, Finland
System Name 4K-gaming
Processor AMD Ryzen 7 5800X
Motherboard Asus ROG Crosshair VII Hero
Cooling Arctic Freezer 50, GPU with custom loop
Memory 32GB Kingston HyperX Fury DDR4-3200
Video Card(s) Asus GeForce RTX 3080 TUF OC 10GB
Storage 256+240+128+480+2x1TB SSDs + 3TB HDDs
Display(s) 27" 4K120 IPS + 32" 4K60 IPS + 24" 1080p144
Case Corsair 4000D Airflow White
Audio Device(s) Corsair HS35
Power Supply EVGA Supernova G2 750W
Mouse Logitech MX518 + Asus TUF P1 mousepad
Keyboard Roccat Vulcan 121 AIMO
VR HMD Oculus Rift CV1
Software Windows 11 Pro
Benchmark Scores It runs Crysis
It's basically a non issue as the "hacker" must have direct access to the device.
Then you have bigger issues.
Agree. I'm pretty sure that us normal home users are fine.
 
Joined
Jan 5, 2006
Messages
18,585 (2.71/day)
System Name AlderLake
Processor Intel i7 12700K P-Cores @ 5Ghz
Motherboard Gigabyte Z690 Aorus Master
Cooling Noctua NH-U12A 2 fans + Thermal Grizzly Kryonaut Extreme + 5 case fans
Memory 32GB DDR5 Corsair Dominator Platinum RGB 6000MT/s CL36
Video Card(s) MSI RTX 2070 Super Gaming X Trio
Storage Samsung 980 Pro 1TB + 970 Evo 500GB + 850 Pro 512GB + 860 Evo 1TB x2
Display(s) 23.8" Dell S2417DG 165Hz G-Sync 1440p
Case Be quiet! Silent Base 600 - Window
Audio Device(s) Panasonic SA-PMX94 / Realtek onboard + B&O speaker system / Harman Kardon Go + Play / Logitech G533
Power Supply Seasonic Focus Plus Gold 750W
Mouse Logitech MX Anywhere 2 Laser wireless
Keyboard RAPOO E9270P Black 5GHz wireless
Software Windows 11
Benchmark Scores Cinebench R23 (Single Core) 1936 @ stock Cinebench R23 (Multi Core) 23006 @ stock
Joined
Nov 13, 2007
Messages
10,590 (1.72/day)
Location
Austin Texas
System Name Planet Espresso
Processor 13700KF @ 5.4GHZ UV - 220W cap
Motherboard MSI 690-I PRO
Cooling Thermalright Phantom Spirit EVO
Memory 48 GB DDR5 7600 MHZ CL36
Video Card(s) RTX 4090 FE
Storage 2TB WD SN850, 4TB WD SN850X
Display(s) Alienware 32" 4k 240hz OLED
Case Jonsbo Z20
Audio Device(s) Yes
Power Supply Corsair SF750
Mouse Xlite V2
Keyboard 65% HE Keyboard
Software Windows 11
Benchmark Scores They're pretty good, nothing crazy.
@phanbuey
@Caring1
until its someone working at the location (gov/mil etc; no suspicion about being around), going rogue.

not everything is about a real world use on a single end user pc, and for certain things even a "less than 1%/not likely.." isnt good enough (to not worry about it)..
That's why I think a risk rating by consumer group would be useful.

Even on mil/gov machines - why try to use this exploit when you already have root?
 

Ruru

S.T.A.R.S.
Joined
Dec 16, 2012
Messages
12,357 (2.87/day)
Location
Jyväskylä, Finland
System Name 4K-gaming
Processor AMD Ryzen 7 5800X
Motherboard Asus ROG Crosshair VII Hero
Cooling Arctic Freezer 50, GPU with custom loop
Memory 32GB Kingston HyperX Fury DDR4-3200
Video Card(s) Asus GeForce RTX 3080 TUF OC 10GB
Storage 256+240+128+480+2x1TB SSDs + 3TB HDDs
Display(s) 27" 4K120 IPS + 32" 4K60 IPS + 24" 1080p144
Case Corsair 4000D Airflow White
Audio Device(s) Corsair HS35
Power Supply EVGA Supernova G2 750W
Mouse Logitech MX518 + Asus TUF P1 mousepad
Keyboard Roccat Vulcan 121 AIMO
VR HMD Oculus Rift CV1
Software Windows 11 Pro
Benchmark Scores It runs Crysis
That's why I think a risk rating by consumer group would be useful.

Even on mil/gov machines - why try to use this exploit when you already have root?
What OSes militaries use today? When I served in 2010, they had Toughbooks with Win7.
 

eidairaman1

The Exiled Airman
Joined
Jul 2, 2007
Messages
41,500 (6.58/day)
Location
Republic of Texas (True Patriot)
System Name PCGOD
Processor AMD FX 8350@ 5.0GHz
Motherboard Asus TUF 990FX Sabertooth R2 2901 Bios
Cooling Scythe Ashura, 2×BitFenix 230mm Spectre Pro LED (Blue,Green), 2x BitFenix 140mm Spectre Pro LED
Memory 16 GB Gskill Ripjaws X 2133 (2400 OC, 10-10-12-20-20, 1T, 1.65V)
Video Card(s) AMD Radeon 290 Sapphire Vapor-X
Storage Samsung 840 Pro 256GB, WD Velociraptor 1TB
Display(s) NEC Multisync LCD 1700V (Display Port Adapter)
Case AeroCool Xpredator Evil Blue Edition
Audio Device(s) Creative Labs Sound Blaster ZxR
Power Supply Seasonic 1250 XM2 Series (XP3)
Mouse Roccat Kone XTD
Keyboard Roccat Ryos MK Pro
Software Windows 7 Pro 64
What OSes militaries use today? When I served in 2010, they had Toughbooks with Win7.
XP, Vista, When I got out in 2012 they were using 7, they probably are using 10
 
Joined
Nov 7, 2017
Messages
1,800 (0.71/day)
Location
Ibiza, Spain.
System Name Main
Processor R7 5950x
Motherboard MSI x570S Unify-X Max
Cooling converted Eisbär 280, two F14 + three F12S intake, two P14S + two P14 + two F14 as exhaust
Memory 16 GB Corsair LPX bdie @3600/16 1.35v
Video Card(s) GB 2080S WaterForce WB
Storage six M.2 pcie gen 4
Display(s) Sony 50X90J
Case Tt Level 20 HT
Audio Device(s) Asus Xonar AE, modded Sennheiser HD 558, Klipsch 2.1 THX
Power Supply Corsair RMx 750w
Mouse Logitech G903
Keyboard GSKILL Ripjaws
VR HMD NA
Software win 10 pro x64
Benchmark Scores TimeSpy score Fire Strike Ultra SuperPosition CB20
@phanbuey
because not everyone with physical access, has a (root) login.
while its a bit ago, when i worked for gov stores, never seen any access to the server/room being restricted past it being located in the back area of an office (IT),
and half the time not occupied by a person.

and its not always about the OS. i had a secure boot board before i was using 10..
 
Joined
Nov 13, 2007
Messages
10,590 (1.72/day)
Location
Austin Texas
System Name Planet Espresso
Processor 13700KF @ 5.4GHZ UV - 220W cap
Motherboard MSI 690-I PRO
Cooling Thermalright Phantom Spirit EVO
Memory 48 GB DDR5 7600 MHZ CL36
Video Card(s) RTX 4090 FE
Storage 2TB WD SN850, 4TB WD SN850X
Display(s) Alienware 32" 4k 240hz OLED
Case Jonsbo Z20
Audio Device(s) Yes
Power Supply Corsair SF750
Mouse Xlite V2
Keyboard 65% HE Keyboard
Software Windows 11
Benchmark Scores They're pretty good, nothing crazy.
@phanbuey
because not everyone with physical access, has a (root) login.
while its a bit ago, when i worked for gov stores, never seen any access to the server/room being restricted past it being located in the back area of an office (IT),
and half the time not occupied by a person.

and its not always about the OS. i had a secure boot board before i was using 10..
yeah but in order to modify the boot manager you have to have ROOT access, in order for this exploit to work.
 

Ruru

S.T.A.R.S.
Joined
Dec 16, 2012
Messages
12,357 (2.87/day)
Location
Jyväskylä, Finland
System Name 4K-gaming
Processor AMD Ryzen 7 5800X
Motherboard Asus ROG Crosshair VII Hero
Cooling Arctic Freezer 50, GPU with custom loop
Memory 32GB Kingston HyperX Fury DDR4-3200
Video Card(s) Asus GeForce RTX 3080 TUF OC 10GB
Storage 256+240+128+480+2x1TB SSDs + 3TB HDDs
Display(s) 27" 4K120 IPS + 32" 4K60 IPS + 24" 1080p144
Case Corsair 4000D Airflow White
Audio Device(s) Corsair HS35
Power Supply EVGA Supernova G2 750W
Mouse Logitech MX518 + Asus TUF P1 mousepad
Keyboard Roccat Vulcan 121 AIMO
VR HMD Oculus Rift CV1
Software Windows 11 Pro
Benchmark Scores It runs Crysis
yeah but in order to modify the boot manager you have to have ROOT access, in order for this exploit to work.
So practically a typical home user is safe?
 
Joined
Aug 20, 2007
Messages
21,291 (3.40/day)
System Name Pioneer
Processor Ryzen R9 9950X
Motherboard GIGABYTE Aorus Elite X670 AX
Cooling Noctua NH-D15 + A whole lotta Sunon and Corsair Maglev blower fans...
Memory 64GB (4x 16GB) G.Skill Flare X5 @ DDR5-6000 CL30
Video Card(s) XFX RX 7900 XTX Speedster Merc 310
Storage Intel 905p Optane 960GB boot, +2x Crucial P5 Plus 2TB PCIe 4.0 NVMe SSDs
Display(s) 55" LG 55" B9 OLED 4K Display
Case Thermaltake Core X31
Audio Device(s) TOSLINK->Schiit Modi MB->Asgard 2 DAC Amp->AKG Pro K712 Headphones or HDMI->B9 OLED
Power Supply FSP Hydro Ti Pro 850W
Mouse Logitech G305 Lightspeed Wireless
Keyboard WASD Code v3 with Cherry Green keyswitches + PBT DS keycaps
Software Gentoo Linux x64 / Windows 11 Enterprise IoT 2024
Meltdown was a lot worse than Spectre. It could basically enable any process to become admin/root, no sorting or sifting needed.

I just think that these researchers run the "boy who cried wolf" risk by overplaying some of these more obscure vulnerabilities. It would help if they gave a "real world risk rating" or some other practical guage of the probability of that this exploit will be used. Maybe a risk by consumer type gauge.
Most of these postings have an officially assigned severity rating. Blame media outlets for not posting it. It's not the researchers fault ya'll like sensationalism and continually feed the media beast.
 
Top