Jan. 16, 2024, 2:26 p.m. |

CERT Recently Published Vulnerability Notes kb.cert.org

Overview


Multiple vulnerabilities were discovered in the TCP/IP stack (NetworkPkg) of Tianocore EDKII, an open source implementation of Unified Extensible Firmware Interface (UEFI). Researchers at Quarkslab have identified a total of 9 vulnerabilities that if exploited via network can lead to remote code execution, DoS attacks, DNS cache poisoning, and/or potential leakage of sensitive information. Quarkslab have labeled these set of related vulnerabilities as PixieFail.


Description


UEFI represents a contemporary firmware standard pivotal in initiating the operating system on modern …

attacks cache cache poisoning can code code execution dns dns cache poisoning dos exploited firmware implementation interface ip stack network open source poisoning quarkslab remote code remote code execution researchers stack tcp tianocore uefi vulnerabilities

More from kb.cert.org / CERT Recently Published Vulnerability Notes

QA Customer Response Engineer

@ ORBCOMM | Sterling, VA Office, Sterling, VA, US

Enterprise Security Architect

@ Booz Allen Hamilton | USA, TX, San Antonio (3133 General Hudnell Dr) Client Site

DoD SkillBridge - Systems Security Engineer (Active Duty Military Only)

@ Sierra Nevada Corporation | Dayton, OH - OH OD1

Senior Development Security Analyst (REMOTE)

@ Oracle | United States

Software Engineer - Network Security

@ Cloudflare, Inc. | Remote

Software Engineer, Cryptography Services

@ Robinhood | Toronto, ON