NSA Tech Report on UEFI SecureBoot, TPM, Librem Key
coderman
coderman at protonmail.com
Fri Sep 25 11:24:44 PDT 2020
‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐
On Thursday, September 24, 2020 7:37 PM, grarpamp <grarpamp at gmail.com> wrote:
...
> https://media.defense.gov/2020/Sep/15/2002497594/-1/-1/0/CTR-UEFI-SECURE-BOOT-CUSTOMIZATION-20200915.PDF/CTR-UEFI-SECURE-BOOT-CUSTOMIZATION-20200915.PDF
see also:
"Espressif ESP32: Bypassing Encrypted Secure Boot (CVE-2020-13629)"
- https://raelize.com/posts/espressif-esp32-bypassing-encrypted-secure-boot-cve-2020-13629/
'''
During our Fault Injection research on the ESP32, we gradually took steps forward in order to identify the required vulnerabilities that allowed us to bypass Secure Boot and Flash Encryption with a single EM glitch. Moreover, we did not only achieve code execution, we also extracted the plain-text flash data from the chip.
'''
best regards,
More information about the cypherpunks
mailing list