Maɓallai masu zaman kansu na Intel da aka yi amfani da su don sanar da firmware na MSI

A lokacin harin da aka kai wa na’urorin sadarwa na MSI, maharan sun yi nasarar zazzage fiye da 500 GB na bayanan cikin kamfanin, wadanda suka kunshi, da dai sauransu, lambobin tushen firmware da makamantansu na hada su. Wadanda suka aikata laifin sun bukaci dala miliyan 4 don ba a bayyana su ba, amma MSI ta ki amincewa kuma an bayyana wasu daga cikin bayanan.

Daga cikin bayanan da aka buga akwai maɓallan sirri na Intel da aka aika zuwa OEMs, waɗanda aka yi amfani da su don sanya hannu a kan firmware da aka saki ta hanyar lambobi da kuma samar da amintaccen taya ta amfani da fasahar Intel Boot Guard. Kasancewar maɓallan tabbatarwa na firmware yana ba da damar samar da sa hannun dijital daidai don ingantaccen firmware ko gyara. Maɓallan Boot Guard suna ba ku damar ƙetare hanyar ƙaddamar da ingantattun abubuwan haɗin gwiwa a matakin taya, waɗanda za a iya amfani da su, alal misali, don yin sulhu da ingantacciyar hanyar taya ta UEFI Secure Boot.

Maɓallan tabbacin firmware suna shafar samfuran MSI aƙalla 57, kuma maɓallan Boot Guard suna shafar samfuran MSI 166. Ya kamata maɓallan Boot Guard ba su iyakance ga lalata samfuran MSI ba kuma ana iya amfani da su don kai hari ga kayan aiki daga wasu masana'antun ta amfani da na'urori na Intel na ƙarni na 11, 12 da 13 (misali, allunan Intel, Lenovo da Supermicro an ambata). Bugu da kari, ana iya amfani da maɓallan jama'a don kai hari ga wasu hanyoyin tabbatarwa ta amfani da Intel CSME (Haɗin Tsaro da Injin Gudanarwa) mai sarrafa, kamar Buɗewar OEM, ISH (Integrated Sensor Hub) firmware, da SMIP (Sa hannu Jagora Hoton Profile).

source: budenet.ru

Add a comment