CVE-2018-12169
📋 TL;DR
This vulnerability allows a physical attacker to bypass firmware authentication in Intel Core processors from 4th to 8th generation. It affects systems using Intel's platform sample code firmware, potentially enabling unauthorized firmware modifications. The attack requires physical access to the device.
💻 Affected Systems
- 4th Generation Intel Core Processor
- 5th Generation Intel Core Processor
- 6th Generation Intel Core Processor
- 7th Generation Intel Core Processor
- 8th Generation Intel Core Processor
📦 What is this software?
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I3 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I5 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I7 by Intel
Core I9 by Intel
⚠️ Risk & Real-World Impact
Worst Case
Attacker with physical access could install malicious firmware, creating persistent backdoors, bypassing secure boot, and compromising the entire system's security foundation.
Likely Case
Targeted attacks against high-value systems where attackers gain physical access to install custom firmware for espionage or data theft.
If Mitigated
With proper physical security controls, the risk is significantly reduced since physical access is required for exploitation.
🎯 Exploit Status
Exploitation requires physical access and specialized hardware/knowledge to interact with firmware. No public exploit code is known.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Varies by OEM - check with device manufacturer
Vendor Advisory: https://support.lenovo.com/us/en/solutions/LEN-20527
Restart Required: Yes
Instructions:
1. Check with your device manufacturer for BIOS/UEFI firmware updates. 2. Download the appropriate firmware update from manufacturer's support site. 3. Follow manufacturer's instructions to flash the updated firmware. 4. Verify the update was successful.
🔧 Temporary Workarounds
Physical Security Controls
allImplement strict physical access controls to prevent unauthorized physical access to devices
Secure Boot Enforcement
allEnable and enforce Secure Boot to detect unauthorized firmware modifications
🧯 If You Can't Patch
- Implement strict physical security controls and access logging for all affected devices
- Deploy tamper-evident seals and regular physical inspections of critical systems
🔍 How to Verify
Check if Vulnerable:
Check BIOS/UEFI firmware version against manufacturer's advisory. Use 'wmic bios get smbiosbiosversion' on Windows or 'dmidecode -t bios' on Linux.
Check Version:
Windows: wmic bios get smbiosbiosversion | Linux: dmidecode -t bios | grep -i version
Verify Fix Applied:
Verify BIOS/UEFI firmware version matches patched version from manufacturer. Check that Secure Boot is enabled and functioning.
📡 Detection & Monitoring
Log Indicators:
- BIOS/UEFI firmware modification events
- Secure Boot violation logs
- Physical access logs showing unauthorized entry
Network Indicators:
- None - this is a physical access vulnerability
SIEM Query:
Search for BIOS/UEFI firmware modification events or Secure Boot failures in system logs
🔗 References
- http://www.securityfocus.com/bid/105387
- https://edk2-docs.gitbooks.io/security-advisory/content/unauthenticated-firmware-chain-of-trust-bypass.html
- https://support.lenovo.com/us/en/solutions/LEN-20527
- http://www.securityfocus.com/bid/105387
- https://edk2-docs.gitbooks.io/security-advisory/content/unauthenticated-firmware-chain-of-trust-bypass.html
- https://support.lenovo.com/us/en/solutions/LEN-20527