Someone in MSI he made them mandara and left hundreds of company motherboards vulnerable to malware
According to BleepingComputer, the vulnerability was discovered by the Polish security researcher David Potocki when he decided to use it Secure Boot on his new desktop computer. The Secure Boot used to ensure that drivers UEFI and operating system startup programs are signed by a trusted digital signature before they are allowed to run.
What he found Potocki was that MSI had changed the default Secure Boot settings in their firmware, and the option “Image Execution Policy" was set to "Always Execute". This means that even if security breaches are detected and the operating system is not trusted, the motherboard will allow it to run.
Users will have no idea their system is vulnerable unless they decide to check its settings themselves Secure Boot. Even worse is the fact that Potocki found out how more than 290 MSI motherboards are at risk, with the full list available for viewing on GitHub.
If you have an MSI motherboard from the list of affected models, the best you can do is update it to the latest firmware version and then manually check that the Image Execution Policy option is set to “ Deny Execute" for "Removable media" and "Fixed media".
We expected that the MSI she would be happy to hear about this problem and ensure that all her motherboards change the setting Image Execution Policy As soon as possible. However, this is not the case. THE Potocki he said:
Do not forget to follow it Xiaomi-miui.gr on Google News to be informed immediately about all our new articles! You can also if you use RSS reader, add our page to your list by simply following this link >> https://news.xiaomi-miui.gr/feed/gn
Follow us on Telegram so that you are the first to learn our every news!