A vulnerability related to the use an insecure Platform Key (PK) has been discovered. An attacker with the compromised PK private key can create malicious UEFI software that is signed with a trusted key that has been compromised.
https://www.supermicro.com/en/support/security_PKFAIL_Jul_2024
https://www.intel.com/content/www/us/en/security-center/announcement/intel-security-announcement-2024-07-25-001.html
https://www.gigabyte.com/us/Support/Security/2205
https://security.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-FJ-ISS-2024-072412-Security-Notice.pdf
https://www.bleepingcomputer.com/news/security/pkfail-secure-boot-bypass-remains-a-significant-risk-two-months-later/
https://www.binarly.io/blog/pkfail-two-months-later-reflecting-on-the-impact
https://arstechnica.com/security/2024/09/secure-boot-neutering-pkfail-debacle-is-more-prevalent-than-anyone-knew/
https://kb.cert.org/vuls/id/455367
https://www.binarly.io/advisories/brly-2024-005
https://uefi.org/specs/UEFI/2.9_A/32_Secure_Boot_and_Driver_Signing.html
https://github.com/binarly-io/Vulnerability-REsearch/blob/main/PKfail/BRLY-2024-005.md
Source: Mitre, NVD
Published: 2024-08-26
Updated: 2024-09-09
Named Vulnerability: PKfail
Base Score: 6.4
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N
Severity: Medium
Vector: CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
EPSS: 0.00035