- Microsoft used the safety co -pilot to scan open source start -up chargers for vulnerabilities
- He discovered 20 new faults in a short time
- Microsoft says that the AI tool saved the business at least a week of work
Microsoft has revealed more about how its latest AI tools prove useful and more identification code vulnerabilities.
The company has published a new blog article detailing how it used safety safety (its cybersecurity tool powered by AI) to find nearly two dozen vulnerabilities in different open source start -up charges.
In total, Microsoft found 11 faults in Grub2 and nine others in U-Boot and Barebox.
Risks of execution of the remote code
GRUB2 (large unified bootloader version 2) is a start -up charger used in Linux and other UNIX type operating systems to manage the starting process and load the operating system.
U-BOOT (DAS U-BOOT) and BAREBOX, on the other hand, are starting chargers mainly used in on-board systems. U-Boot is a widely adopted start-up charger supporting various architectures, while Barebox is an alternative designed for faster starting times and easier maintenance.
Vulnerabilities extend to whole overflows and buffers, lateral channel attacks and places to read vulnerabilities.
Some of the faults could be used to execute arbitrary code, said Microsoft, while others would need physical access to the vulnerable device, or need the device to be infected with malware beforehand.
“While threat actors would probably require physical access to exploit U-Boot or Barebox vulnerabilities, in the case of GRUB2, vulnerabilities could be used to bypass secure start and install stealth bootkits or potentially bypassing other safety mechanisms, such as BitLocker,” said Microsoft.
“The implications of the installation of these boots are important, as this can grant the threat stakeholders a complete control over the device, allowing them to control the start -up process and the operating system, compromise additional devices on the network and continue other malicious activities.”
“In addition, this could lead to persistent malware that remains intact even after resettlement of the operating system or a replacement of the hard disk.”
All faults now have an attributed CVE, and their severity is mainly “average”, that being “high” – 7.8 / 10.