Sur 300 Les modèles de cartes mères MSI ont une implémentation de démarrage sécurisé défectueuse avec certaines versions de micrologiciel UEFI


The UEFI Secure Boot feature is designed to prevent malicious code from executing during the system boot process, and has been a cybersecurity staple since the late-2000s, when software support was introduced with Windows 8. Dawid Potocki, a New Zealand-based IT student and cybersecurity researcher, discovered that as many as 300 motherboard models by MSI have a faulty Secure Boot implementation with certain versions of their UEFI firmware, which allows just about any boot image to load. C'est, cependant, localized to only certain UEFI firmware versions, that are released as beta versions.

Potocki stumbled upon this when he found that his PRO Z790-A WiFi motherboard failed to verify the cryptographic signature boot-time binaries at the time of system boot. “I have found that my firmware was… accepting every OS image I gave it, no matter if it was trusted or not.He then began examining other motherboard models, and discovered close to 300 MSI motherboard models with a broken Secure Boot implementation. He clarified that MSI laptops aren’t affected, and only their desktop motherboards are. Potocki says that affected MSI motherboards have analways executepolicy set for Secure Boot, which makes the mechanism worthless, and theorized a possible reason. “I suspect this is because they probably knew that Microsoft wouldn’t approve of it and/or that they get less tickets about Secure Boot causing issues for their users.