bootkit-samples
Bootkit sample for firmware attack (by hardenedvault)
CVE-2022-21894
baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability (by Wack0)
bootkit-samples | CVE-2022-21894 | |
---|---|---|
15 | 5 | |
231 | 276 | |
1.3% | - | |
3.0 | 2.4 | |
about 1 year ago | 8 months ago | |
C | ||
- | The Unlicense |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
bootkit-samples
Posts with mentions or reviews of bootkit-samples.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2023-03-02.
- Bootkit Showcase: Real-World Examples of Infrastructure Security Threats
-
BlackLotus UEFI bootkit: Myth confirmed
Bootkit samples https://github.com/hardenedvault/bootkit-samples
-
First in-the-wild UEFI bootkit bypassing UEFI Secure Boot
https://github.com/hardenedvault/bootkit-samples
The short-term solution for workaround is to protect the OS runtime. Otherwise you'd have to build the defense-in-depth at very infrastructure level from scratch with hardware, firmware and OS with attestation service not only based on the "confidential computing" but typically TCG's trusted computing.
- GitHub - hardenedvault/bootkit-samples: Bootkit sample for firmware attack
- Conti RaaS group chat leaked (English translation) about firmware exploit
- Conti RaaS group chat leaked (Eng-translation) about CSME/SMM firmware implant
- Conti RaaS group chat leaked (English translation) about firmware exploit and implant
- Bootkit samples
CVE-2022-21894
Posts with mentions or reviews of CVE-2022-21894.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2023-03-08.
-
Stealthy UEFI malware bypassing Secure Boot enabled by unpatchable Windows flaw
ESET described what BlackLotus does to exploit baton drop:
-
BlackLotus UEFI bootkit: Myth confirmed
CVE-2022-21894 PoC: Secure Boot Security Feature Bypass Vulnerability https://github.com/Wack0/CVE-2022-21894
-
First in-the-wild UEFI bootkit bypassing UEFI Secure Boot
The write-up I saw suggests that revoking the Windows bootloader would cause existing install and restore images to fail to boot even with Secure Boot disabled because it checks its own signature, which would be pretty amazing if true: https://github.com/Wack0/CVE-2022-21894
- Baton Drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability
What are some alternatives?
When comparing bootkit-samples and CVE-2022-21894 you can also consider the following projects:
shim - UEFI shim loader
Ventoy - A new bootable USB solution.
CVE-2020-0796 - CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost
AreWeAntiCheatYet - A comprehensive and crowd-sourced list of games using anti-cheats and their compatibility with GNU/Linux or Wine.