23 Major BIOS Vulnerabilities Discovered, Impact Intel, Lenovo, Others

News has emerged of 23 new vulnerabilities that are particularly nefarious because the UEFI/BIOS-based attacks bypass security mechanisms and persist after drive formats and system re-installations, and attackers can exploit the vulnerabilities remotely. Security experts at Binarly have discovered 23 high-impact vulnerabilities hiding in BIOS/UEFI software from a multitude of system vendors, including Intel, Microsoft, Lenovo, Dell, Fujitsu, HP, HPE, Siemens, and Bull Atos (via Bleeping Computer). These vulnerabilities include SMM Callout or Privilege Escalation, SMM Memory Corruption, and DXE Memory corruption. 

Last week found news emerged of the MoonBounce malware that hides in your BIOS chip, but Binarly's disclosure indicates a wide range of UEFI vulnerabilities that can be used as a springboard to install malware, or even new infected firmware images. 

Binarly found the issue causing all these vulnerabilities were associated with InsydeH20, a firmware framework code used to build motherboard BIOS's/UEFI's. All the appropriate vendors were using Insyde's firmware SDK for motherboard development.

If you're worried about infection, there will be a way you can check and see if your computer is infected with these exploits. Binarly developed a piece of software called FwHunt that can detect vulnerable code patterns. But for now, the rules remain hidden and will be revealed through GitHub once the vulnerability advisory becomes public.

As for a real fix, we don't have a set date on official firmware patches. However, Binarly notes that using the VINCE platform for communicating with multiple vendors/parties allows them to reduce the security fix timeline down to 5 months. That means we can expect official firmware updates to happen around the second half of 2022.

Aaron Klotz
Contributing Writer

Aaron Klotz is a contributing writer for Tom’s Hardware, covering news related to computer hardware such as CPUs, and graphics cards.