Vijay Sarvepalli

423 posts

Vijay Sarvepalli banner
Vijay Sarvepalli

Vijay Sarvepalli

@vijaycert

Keep life chaotic.

Arlington, VA Katılım Temmuz 2013
82 Takip Edilen118 Takipçiler
MasterChief Engineering Works
MasterChief Engineering Works@MasterChiefEng·
Does anyone see this as a valid patent / application? Nobody had a low priority, high priority interrupt vector table before? The patent application could be considered if it was at the bare minimum an innovative design implementation. patents.google.com/patent/US10067…
MasterChief Engineering Works tweet media
English
1
0
0
47
Vijay Sarvepalli
Vijay Sarvepalli@vijaycert·
Here is another #UEFI vulnerability that takes months to coordinate. UEFI blocking DBX updates are still trickling in - most Linux and Windows users, trusting SecureBoot, are currently vulnerable. Digitally signing supply-chain is another major gap in our UEFI 5 recommendations
ESET Research@ESETresearch

#ESETresearch discovered and reported to @certcc a vulnerability that allows bypassing UEFI Secure Boot on most UEFI-based systems. This vulnerability, #CVE-2024-7344, was found in a UEFI app signed by Microsoft’s 3rd-party UEFI certificate. @smolar_m welivesecurity.com/en/eset-resear… 1/4

English
0
0
1
103
Vijay Sarvepalli retweetledi
UEFI Forum
UEFI Forum@UEFIForum·
In the upcoming #UEFIForum webinar “Coordinating #UEFI Vulnerabilities as CERT/CC,” @CarnegieMellon will provide practical steps when coordinating UEFI vulnerabilities. Join us for the webinar on Nov. 21 at 8 a.m. PT: bit.ly/4ffgZZ1
UEFI Forum tweet media
English
0
2
0
3.2K
Simone Margaritelli
Simone Margaritelli@evilsocket·
* Unauthenticated RCE vs all GNU/Linux systems (plus others) disclosed 3 weeks ago. * Full disclosure happening in less than 2 weeks (as agreed with devs). * Still no CVE assigned (there should be at least 3, possibly 4, ideally 6). * Still no working fix. * Canonical, RedHat and others have confirmed the severity, a 9.9, check screenshot. * Devs are still arguing about whether or not some of the issues have a security impact. I've spent the last 3 weeks of my sabbatical working full time on this research, reporting, coordination and so on with the sole purpose of helping and pretty much only got patronized because the devs just can't accept that their code is crap - responsible disclosure: no more.
Simone Margaritelli tweet media
English
82
489
2.8K
364.7K
Vijay Sarvepalli
Vijay Sarvepalli@vijaycert·
@binitamshah Is there a RCE POC? the POC is all crash so far. May be you are able to write one?
English
0
0
0
613
Vijay Sarvepalli
Vijay Sarvepalli@vijaycert·
Trying to find #pkfail in our servers -found one! vijay@thinkserver-TS$ efi-readvar -v PK Variable PK, length 862 PK: List 0, type X509 Signature 0, size 834, owner 26dc4851-195f-4ae1-9a19-fbf883bbb35e Subject: CN=DO NOT TRUST - AMI Test PK Issuer: CN=DO NOT TRUST - AMI Test PK
English
1
0
1
90
Nikolaj Schlej
Nikolaj Schlej@NikolajSchlej·
Decided to take a leave of absence from my FWSEC job to care for my aging parents. Will be in Germany for the next ~6 months, will see if I could return to the US after that. It's unlikely I'll be able to actively work on UEFITool, but I'll return to it when life gets less busy.
English
2
0
36
2.7K
Vijay Sarvepalli
Vijay Sarvepalli@vijaycert·
"we are repeating the same mistakes that we did in the past, We decided at some point it is super convenient to mix code and data... we are mixing code and data that we send to these AI systems.... that are under the control of the user." Dr. Daniel Gruss youtube.com/watch?v=XxVHku…
YouTube video
YouTube
English
0
0
1
94
Vijay Sarvepalli retweetledi
Satoshi Tanda
Satoshi Tanda@standa_t·
Intel Hardware Shield deep dive: part 2 is SMM security policy reporting (ISSR, aka PPAM) and interaction with Windows' Secure Launch. tandasat.github.io/blog/2024/03/1… Another fascinating piece of technology! I have wanted to review this for a while and am glad I have spent time for it.
Satoshi Tanda tweet mediaSatoshi Tanda tweet media
Satoshi Tanda@standa_t

Intel Hardware Shield deep dive: part 1 is user-mode System Management Mode (ISRD). tandasat.github.io/blog/2024/02/2… ISRD is beautifully architected, and I have enjoyed studying it a lot. Excellent work by Intel.

English
0
39
115
16K
Trail of Bits
Trail of Bits@trailofbits·
Today, we are disclosing LeftoverLocals, a vulnerability that allows listening to LLM responses through leaked GPU local memory created by another process on Apple, Qualcomm, AMD, and Imagination GPUs (CVE-2023-4969) buff.ly/48RDP68
GIF
English
11
219
923
306.6K
James Kettle
James Kettle@albinowax·
I usually avoid non-technical posts... but can't resist sharing yesterday was the happiest day of my life #wedding
James Kettle tweet media
English
272
21
1.8K
63.5K
Alex Matrosov
Alex Matrosov@matrosov·
Binarly REsearch will drop technical details on #LogoFAIL in 5 days! /cc @pagabuc @flothrone @xorpse @yeggorv @ant_av7 Thank you, @certcc and @vijaycert for coordinating this massive industry-wide disclosure!
Black Hat@BlackHatEvents

Calling all #cybersecurity pros! Join #BHEU Briefings "LogoFAIL: Security Implications of Image Parsing During System Boot" with CEO of BINARLY @matrosov sharing the latest research revealing significant security vulnerabilities. Register now >> bit.ly/3sLm2hD

English
2
13
38
6.5K