TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Ask HN: Too theoretical for hackers to flash your firmware excluding boot ROM?

3 点作者 PrimaryAlibi5 个月前
Most computer components have firmware otherwise they wouldn&#x27;t do anything. This means that firmware exists in more than just the boot rom. This topic excludes the boot rom because I know it&#x27;s not too theoretical for a hacker to flash the boot rom. It&#x27;s clearly explained step by step how to do external boot rom flash on many different websites such as Coreboot. But this topic is not about the boot rom, it&#x27;s about the other firmwares on a laptop such as cam, mic, keyboard, bluetooth, embedded controller.<p>Is it too theoretical how a hacker would do that? As in would it require some very rare 0-day vulnerability which might not exist currently? Or are there known ways how a hacker would be able to flash malware into these components such as the embedded controller or cam?<p>The reason I ask is because I&#x27;ve heard from people in cyber security saying two arguments: yes it&#x27;s possible, no it&#x27;s too theoretical or &quot;way too unlikely&quot;. So which is it? No one has actually tried explaining their answer or linking to any source. Answers are always vague.<p>I think it&#x27;s important to have these answer because when it comes to firmware security, it makes a huge different if all you need to do is to flash the boot rom to ensure your firmware is uncompromised. That would make security 1000 times easier. But if it&#x27;s not enough then you would maybe have to Unfortunately throw away the computer if you think there&#x27;s compromised firmware because you won&#x27;t be able to get rid of it.<p>Don&#x27;t forget to explain your answer. Please give link to source and further reading about this.

3 条评论

wmf5 个月前
Intel&#x2F;AMD&#x2F;Apple have put a decent amount of work into protecting boot and EC firmware but all the other stuff is probably totally insecure. Any code running in kernel mode could flash a lot of different firmware. Note that built-in devices probably have their firmware bundled into the main boot firmware so they may be protected.<p>Just because something is possible doesn&#x27;t mean it&#x27;s likely that an attacker would burn a 0-day against you though.
评论 #42395626 未加载
评论 #42395214 未加载
bigfatkitten5 个月前
It&#x27;s not theoretical at all. You can flash firmware updates from userspace on pretty much any modern x86 machine but in practice, UEFI bootkits are almost good.<p>If you want a case study, BlackLotus is a good starting point.<p><a href="https:&#x2F;&#x2F;www.eset.com&#x2F;au&#x2F;about&#x2F;newsroom&#x2F;press-releases1&#x2F;eset-blog&#x2F;eset-research-analyzes-blacklotus-a-uefi-bootkit-that-can-bypass-uefi-secure-boot-on-fully-patched-systems&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.eset.com&#x2F;au&#x2F;about&#x2F;newsroom&#x2F;press-releases1&#x2F;eset-...</a>
评论 #42395177 未加载
bigiain5 个月前
The recent BadRAM attack against AMD&#x27;s Secure Encrypted Virtualisation works by changing something in the memory DIMM&#x27;s SPD (Serial Presence Detect) EEPROM firmware causing out to report twice as much RAM as the DIMM really has. Chaining this up with a bunch of other neat tricks they gain access to protected memory that the CPU is _supposed_ to prevent.<p>I don&#x27;t think there&#x27;s a public working exploits (yet?), but it can &quot;likely&quot; in some cases (depending on the DIMMS you have installed) be done without hardware access, purely through software:<p>&quot;In some cases, with certain DIMM models that don&#x27;t adequately lock down the chip, the modification can likely be done through software.&quot;<p><a href="https:&#x2F;&#x2F;arstechnica.com&#x2F;information-technology&#x2F;2024&#x2F;12&#x2F;new-badram-attack-neuters-security-assurances-in-amd-epyc-processors&#x2F;" rel="nofollow">https:&#x2F;&#x2F;arstechnica.com&#x2F;information-technology&#x2F;2024&#x2F;12&#x2F;new-b...</a><p>So yeah, it&#x27;s possible for a hacker to flash malware onto your DIMMs...<p>(Whether that&#x27;s a thing you need to care about is a good question. This isn&#x27;t something a driveway script kiddie is gonna do after he p0wns your WordPress site with vulnerable plugins. But if you&#x27;re running a dark web drug market on commercially hosted cloud servers and a powerful enough Three Letter Agency becomes intersted in you...)