Be careful what you do with your BRIX as two rather unpleasant vulnerabilities were disclosed at a recent BlackHat event. Gigabyte did not implement two security features which these exploits take advantage of, there is no write protection on the UEFI firmware nor a system of cryptographic signatures on UEFI firmware files which can let any file update the UEFI. While the proof of concept demonstration only prevented the infected BRIX from booting again, this could also be used to infect your machines UEFI quietly and in a way extremely difficult to repair, you would need a UEFI update that wrote over every sector of the firmware to ensure you removed the bugs. Pop by Slashdot for more on this depressing topic.
"Last week, at the BlackHat Asia 2017 security conference, researchers from cyber-security firm Cylance disclosed two vulnerabilities in the firmware of Gigabyte BRIX small computing devices, which allow an attacker to write malicious content to the UEFI firmware."
Here is some more Tech News from around the web:
- A moment of Zen with David Kanter: The TR Podcast 190
- Microsoft Finally Reveals What Data Windows 10 Really Collects @ Slashdot
- How to Trick Your Electrical Meter By Saving Power @ Hack a Day
- Scientists develop self-healing material for smartphone displays and lithium-ion batteries @ The Inquirer
- Google's video recognition AI is trivially trollable @ The Register
- It's 30 years ago: IBM's final battle with reality @ The Register