The EDK2 UEFI reference implementation contains multiple vulnerabilities in the Capsule Update mechanism.
Description
The open source EDK2 project provides a reference implementation of the Unified Extensible Firmware Interface (UEFI). Researchers at The MITRE Corporation have discovered multiple vulnerabilities in the EDK2 Capsule Update mechanism. Commercial UEFI implementations may incorporate portions of the EDK2 source code, including the vulnerable Capsule Update code. Buffer overflow in Capsule Processing Phase - CVE-2014-4859 |
Impact
A local authenticated attacker may be able to execute arbitrary code with the privileges of system firmware, potentially allowing for persistent firmware level rootkits, bypassing of Secure Boot, or permanently DoS'ing the platform. |
Solution
Please see the Vendor Information section below to determine if your system may be affected. We are continuing to communicate with vendors as they investigate these vulnerabilities. |
Vendor Information (Learn More)
Vendor | Status | Date Notified | Date Updated |
---|---|---|---|
American Megatrends Incorporated (AMI) | Affected | 22 Jul 2014 | 01 Aug 2014 |
Hewlett-Packard Company | Affected | 09 Jul 2014 | 05 Aug 2014 |
Intel Corporation | Affected | 03 Dec 2013 | 05 Aug 2014 |
Phoenix Technologies Ltd. | Affected | 22 Jul 2014 | 05 Aug 2014 |
Insyde Software Corporation | Not Affected | 22 Jul 2014 | 24 Jul 2014 |
Apple Inc. | Unknown | 22 Jul 2014 | 22 Jul 2014 |
Dell Computer Corporation, Inc. | Unknown | 22 Jul 2014 | 22 Jul 2014 |
IBM Corporation | Unknown | 22 Jul 2014 | 22 Jul 2014 |
Lenovo | Unknown | 22 Jul 2014 | 22 Jul 2014 |
NEC Corporation | Unknown | 22 Jul 2014 | 22 Jul 2014 |
Sony Corporation | Unknown | 22 Jul 2014 | 22 Jul 2014 |
Toshiba | Unknown | 22 Jul 2014 | 22 Jul 2014 |
If you are a vendor and your product is affected, let us know.
CVSS Metrics (Learn More)
Group | Score | Vector |
---|---|---|
Base | 6.0 | AV:L/AC:H/Au:S/C:C/I:C/A:C |
Temporal | 5.4 | E:POC/RL:ND/RC:C |
Environmental | 7.3 | CDP:MH/TD:H/CR:ND/IR:H/AR:ND |
References
Credit
Thanks to Corey Kallenberg, Xeno Kovah, John Butterworth, and Sam Cornwell of the MITRE Corporation for reporting this vulnerability. Thanks also goes to Intel's Advanced Threat Research and Security Center of Excellence for assisting with industry notification and coordination.
This document was written by Todd Lewellen.
Other Information
- CVE IDs: CVE-2014-4859 CVE-2014-4860
- Date Public: 07 8월 2014
- Date First Published: 07 8월 2014
- Date Last Updated: 07 8월 2014
- Document Revision: 20