Deploying low-level malware implants
As soon as an attacker manages to execute malicious code contained in the SMM they may probably inject a persistent malware implant contained in the UEFI, however this is determined by the platform’s configuration, as UEFI can have extra protections comparable to AMD’s ROM Armor, which controls entry to the SPI flash reminiscence the place UEFI is saved.
Nevertheless, ROM Armor is a more recent function and doesn’t exist in most computer systems impacted by the vulnerability. One other function that would forestall malware contained in the UEFI is Platform Safe Boot, which establishes a cryptographic chain of belief for UEFI firmware code; however this isn’t current or enabled in all techniques both.
Even when these options are enabled, attackers might as a minimum break Safe Boot, which is supposed to guard the integrity of the OS boot course of and solely permit signed bootloaders to execute. By defeating Safe Boot, attackers can deploy a boot-level rootkit, or bootkit, that can execute earlier than the OS kernel begins and take management over your complete system, having the ability to cover processes and information from any OS-level endpoint safety product.