Deploying low-level malware implants
As soon as an attacker manages to execute malicious code contained in the SMM they might doubtlessly inject a persistent malware implant contained in the UEFI, however this will depend on the platform’s configuration, as UEFI can have further protections comparable to AMD’s ROM Armor, which controls entry to the SPI flash reminiscence the place UEFI is saved.
Nevertheless, ROM Armor is a more moderen characteristic and doesn’t exist in most computer systems impacted by the vulnerability. One other characteristic that would forestall malware contained in the UEFI is Platform Safe Boot, which establishes a cryptographic chain of belief for UEFI firmware code; however this isn’t current or enabled in all techniques both.
Even when these options are enabled, attackers may at least break Safe Boot, which is supposed to guard the integrity of the OS boot course of and solely permit signed bootloaders to execute. By defeating Safe Boot, attackers can deploy a boot-level rootkit, or bootkit, that may execute earlier than the OS kernel begins and take management over your complete system, having the ability to conceal processes and information from any OS-level endpoint safety product.