Share this article

Latest news

With KB5043178 to Release Preview Channel, Microsoft advises Windows 11 users to plug in when the battery is low

Copilot in Outlook will generate personalized themes for you to customize the app

Microsoft will raise the price of its 365 Suite to include AI capabilities

Death Stranding Director’s Cut is now Xbox X|S at a huge discount

Outlook will let users create custom account icons so they can tell their accounts apart easier

The LogoFAIL vulnerability allows image file attacks on your device

Hackers could exploit the vulnerability remotely

2 min. read

Published onApril 10, 2024

published onApril 10, 2024

Share this article

Read our disclosure page to find out how can you help Windows Report sustain the editorial teamRead more

AMD partners started rolling out firmware updates to fix the LogoFAIL vulnerability. To do this, they upgraded AGESA (AMD Generic Encapsulated Software Architecture) to version 1.2.0.B. In addition, they added a patch for the LogoFAILUEFI vulnerability. On top of that, Aorus Elite V2 and Gigabyte B550 received the update last month.

Asus, MSI, and ASRock are also starting to roll the LogoFAIL UEFI vulnerability patch. However, the AMD firmware is a bit late in updating. After all, Intel started releasing patches in December 2023.

How does the LogoFAIL vulnerability work?

How does the LogoFAIL vulnerability work?

According toKaspersky, the LogoFAIL vulnerability (CVE-2023-40238) allows threat actors to exploit the process of customizing boot logos on computers. When you turn your PC on, the UEFI firmware starts first and displays the manufacturer’s logo.

You can use the feature to change your logo. However, it also allows hackers to do it. Thus, they canaccess your PCbefore the OS starts andgain control over it. On top of that, they can do it remotely and use UEFI bootkits.

Hackers can exploit the LogoFAIL vulnerability to modify system files and run malicious codes with the highest privileges. On top of that, the malware can still exist after reinstalling the OS and replacing the hard drive.

Cybercriminals can trigger the vulnerability by changing the resolution of the Boot image. As a result, they cause a calculation error. Through it, they can inject malicious code into a memory area for an executable code.

Some manufacturers like Lenovo, Intel, and Acer allow you to change your Boot logo. So, they make it easier for hackers to attack your device. Also, some security features, like Intel Boot Guard and AMD Hardware-Validated Boot, don’t protect you against the LogoFAIL vulnerability because it happens before the boot.

The UEFI firmware allows the usage of multiple image formats such as BMP, GIF, JPEG, PCX, PNG, and TGA. As a result, there are more chances for threat actors to attack your system.

Ultimately, AMD systems started to roll updates to patch the LogoFAIL vulnerability late. Also, it is hard to get rid of it. However, some systems, such as Apple laptops or Dell devices, don’t permit a Boot logo change or have many restrictions.

What are your thoughts? Did you know that you could change your Boot logo? Let us know in the comments.

More about the topics:Cybersecurity,UEFI

Sebastian Filipoiu

Sebastian is a content writer with a desire to learn everything new about AI and gaming. So, he spends his time writing prompts on various LLMs to understand them better. Additionally, Sebastian has experience fixing performance-related problems in video games and knows his way around Windows. Also, he is interested in anything related to quantum technology and becomes a research freak when he wants to learn more.

User forum

0 messages

Sort by:LatestOldestMost Votes

Comment*

Name*

Email*

Commenting as.Not you?

Save information for future comments

Comment

Δ

Sebastian Filipoiu

Sebastian is a content writer with a desire to learn everything new about AI and gaming.