Alex Tereshkin

135 posts

Alex Tereshkin

Alex Tereshkin

@AlexTereshkin

Poked firmware before it was cool. Security researcher @NVIDIA. Opinions expressed are my own.

Katılım Ağustos 2015
166 Takip Edilen602 Takipçiler
Alex Tereshkin retweetledi
BINARLY🔬
BINARLY🔬@binarly_io·
Nvidia OSR (@AlexTereshkin, @Adam_pi3) reveals high-impact Supermicro BMC vulnerabilities (CVE-2024-10237/38/39). Binarly REsearch documenting the details: 👻Ghost in the Controller: Abusing Supermicro BMC Firmware Verification. Read the full story: binarly.io/blog/ghost-in-…
English
1
21
29
7.4K
Alex Tereshkin retweetledi
Adam 'pi3' Zabrocki
Adam 'pi3' Zabrocki@Adam_pi3·
Together with @AlexTereshkin we managed to summarize NVIDIA Offensive Security Research (OSR) work on breaking BMC (reference to our DefCon talk youtube.com/watch?v=dbJQIQ…). This blog post also includes a link to the full paper.
YouTube video
YouTube
NVIDIA Data Center@NVIDIADC

Baseboard Management Controllers (BMCs) are vital for remote server management, but they can also be a significant security risk. Explore findings and recommendations to safeguard your #datacenter infrastructure from NVIDIA's Offensive Security Research team. ➡️ nvda.ws/3HsQOme

English
0
13
28
6.3K
Alex Tereshkin retweetledi
Adam 'pi3' Zabrocki
Adam 'pi3' Zabrocki@Adam_pi3·
I'm delighted to share that our talk "How to Secure Unique Ecosystem Shipping 1 Billion+ Cores?" has been accepted to @BlackHatEvents #BHUSA 2025! How to create a secure unique ecosystem from scratch? What's Separation Kernel? How and why to modify RISC-V? come to our talk! :)
English
2
11
42
6.9K
Alex Tereshkin retweetledi
Nikolaj Schlej
Nikolaj Schlej@NikolajSchlej·
Found a nice little SecureBoot bypass in a sizable bunch of UEFI firmwares, will share the details when able. Meanwhile, this is the SHA2-256 of the PoC tool to trigger it: 530584749f90d187ac20f77c6d4bb2e09ec1c852090962dfab01c4274a8a6d2d
English
1
10
37
16K
Alex Tereshkin retweetledi
Alex Matrosov
Alex Matrosov@matrosov·
#LogoFAIL abstract is online! Embargo ends on Dec 6th. LogoFAIL impacting all major IBVs reverence code: AMI, Insyde, and Phoenix. Also, this attack is not silicon-specific but UEFI-specific🔥 and impacts ARM and x86. Kudos to @Binarly_io REsearch team! #logofail-security-implications-of-image-parsing-during-system-boot-35042" target="_blank" rel="nofollow noopener">blackhat.com/eu-23/briefing…
Alex Matrosov tweet media
English
5
35
82
19.2K
Alex Tereshkin retweetledi
Alex Matrosov
Alex Matrosov@matrosov·
🔬OSR Team keeps rocking! @AlexTereshkin and @Adam_pi3 keep digging into BMC and FW rabbit hole. 🔥The main caveat is that most of those discoveries are related to IBVs reference code and impact the entire industry. ⛓️One vendor fix != Industry ⛓️Supply Chain Security is hard!
NVIDIA PSIRT@NVIDIAPSIRT

NVIDIA released a security bulletin for NVIDIA DGX H100. Thanks to the NVIDIA OSR team for: CVE‑2023‑25531, CVE‑2023‑25532, CVE‑2023‑25533, CVE‑2023‑25534, CVE‑2023‑31008, CVE‑2023‑31009, CVE‑2023‑31010, CVE‑2023‑31011, CVE‑2023‑31012, and CVE‑2023‑31013 nvidia.com/en-us/security/

English
0
8
19
5.8K