Deploying low-level malware implants
As soon as an attacker manages to execute malicious code contained in the SMM they may doubtlessly inject a persistent malware implant contained in the UEFI, however this relies on the platform’s configuration, as UEFI can have further protections akin to AMD’s ROM Armor, which controls entry to the SPI flash reminiscence the place UEFI is saved.
Nonetheless, ROM Armor is a more moderen characteristic and doesn’t exist in most computer systems impacted by the vulnerability. One other characteristic that would forestall malware contained in the UEFI is Platform Safe Boot, which establishes a cryptographic chain of belief for UEFI firmware code; however this isn’t current or enabled in all techniques both.
Even when these options are enabled, attackers may as a minimum break Safe Boot, which is supposed to guard the integrity of the OS boot course of and solely permit signed bootloaders to execute. By defeating Safe Boot, attackers can deploy a boot-level rootkit, or bootkit, that may execute earlier than the OS kernel begins and take management over your complete system, having the ability to disguise processes and information from any OS-level endpoint security product.