NSA Tech Report on UEFI SecureBoot, TPM, Librem Key

coderman coderman at protonmail.com
Fri Sep 25 11:24:44 PDT 2020


‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐
On Thursday, September 24, 2020 7:37 PM, grarpamp <grarpamp at gmail.com> wrote:
...
> https://media.defense.gov/2020/Sep/15/2002497594/-1/-1/0/CTR-UEFI-SECURE-BOOT-CUSTOMIZATION-20200915.PDF/CTR-UEFI-SECURE-BOOT-CUSTOMIZATION-20200915.PDF


see also:
"Espressif ESP32: Bypassing Encrypted Secure Boot (CVE-2020-13629)"
- https://raelize.com/posts/espressif-esp32-bypassing-encrypted-secure-boot-cve-2020-13629/

'''
During our Fault Injection research on the ESP32, we gradually took steps forward in order to identify the required vulnerabilities that allowed us to bypass Secure Boot and Flash Encryption with a single EM glitch. Moreover, we did not only achieve code execution, we also extracted the plain-text flash data from the chip.
'''

best regards,


More information about the cypherpunks mailing list