Overview
A race condition exists in Intel chipsets that rely solely on the BIOS_CNTL.BIOSWE and BIOS_CNTL.BLE bits as a BIOS write locking mechanism. Successful exploitation of this vulnerability may result in a bypass of this locking mechanism.
Description
CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') A race condition exists in Intel chipsets that rely solely on the BIOS_CNTL.BIOSWE and BIOS_CNTL.BLE bits as a BIOS write locking mechanism. According to Corey Kallenberg of The MITRE Corporation: |
Impact
A local, authenticated attacker could write malicious code to the platform firmware. Additionally, if the "UEFI Variable" region of the SPI Flash relies on BIOS_CNTL.BIOSLE for write protection, as many implementations do, this vulnerability could be used to bypass UEFI Secure Boot. Lastly, the attacker could corrupt the platform firmware and cause the system to become inoperable. |
Solution
Please see the Vendor Information section below to determine if your system may be affected. We are continuing to communicate with vendors as they investigate these vulnerabilities. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 6 | AV:L/AC:H/Au:S/C:C/I:C/A:C |
Temporal | 5.1 | E:POC/RL:ND/RC:UR |
Environmental | 5.3 | CDP:MH/TD:M/CR:ND/IR:ND/AR:ND |
References
Acknowledgements
Thanks to Corey Kallenberg and Rafal Wojtczuk for reporting this vulnerability. This issue was also independently co-discovered by John Butterworth and Sam Cornwell of the MITRE Corporation.
This document was written by Todd Lewellen.
Other Information
CVE IDs: | CVE-2014-8273 |
Date Public: | 2014-12-28 |
Date First Published: | 2015-01-05 |
Date Last Updated: | 2015-07-23 16:39 UTC |
Document Revision: | 37 |