LogoFAIL Exploit Details

Friday, December 15, 2023 10:39AM

One of the major things currently in the media is the discovery of the LogoFAIL vulnerability which was disclosed by a security research firm, Binarly, if you’re into technical knowledge you can read the article here.

What it means to users

The TL:DR; of this for users is that there maybe a major bug in their boot firmware which may allow for more persistant malware. And like always, it is a good idea to practice vigilance in downloading and installing software.

Another thing to keep in mind is that for us tech providers, from what I gather, is that reflashing firmware may become a part of malware scrubbing which means extra time and extra risk to the device.

At least until vendors release patches to effected firmware, which may not come to older devices.

What it means to developers

Software developers, especially those dealing in Open Source projects, should be made very aware of this exploit and the signs to look out for when performing code review from other contributors and pull requests. As personally, if there is a wide exploit on this then I could see a major Open Source project being a primary vessel for this.

Or even on Closed Source software, if a cyber crime ring can bring an inside actor to the development floor of a company and introduce the exploit that way.

So if you are a developer or open source contributor, be sure to review code more vigilantly.

Future mitigations

As firmware providers start releasing patches to this vulnerability, device vendors should be pushing patches out to the userbase in the (hopefully) near future. If your device starts updating its firmware, don’t interrupt it, and make sure you plug it into power if it’s a laptop.

Alternatively, you can get your device model and serial number and check against your device manufacturer’s website for system firmware updates, which their release notes should state “LogoFAIL” in it somewhere.